SlideShare a Scribd company logo
1 of 4
Download to read offline
ISSN: 2277 – 9043
    International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE)
                                                                             Volume 1, Issue 6, August 2012




  Security threats to data mining and analysis
                               tools of TIA program
Swati Vashisht                    Divya Singh                        Bhanu Prakash Lohani
Lecturer at CSE deptt             Lecturer at CSE deptt              Lecturer at CSE deptt.
DIT SE Gr. Noida                  DIT SE Gr. Noida                   DIT SE Gr. Noida



                                                                           I. INTRODUCTION
Abstract: Data mining is the process that attempts
                                                          Data mining is the process of discovering new
to discover patterns in large data sets. The actual
                                                          patterns from large data sets involving methods at the
data mining task is the automatic or semi-
                                                          intersection    of   artificial     intelligence,   machine
automatic analysis of large quantities of data to
                                                          learning, statistics and data base system. It is the
extract previously unknown interesting patterns
                                                          process of analyzing data from different perspectives
such as groups of data records i.e.cluster analysis,
                                                          and   summarizing       it   into     useful   information,
unusual    records     (anomaly   detection)    and
                                                          information that can predict the success of a
dependencies association rule mining. This usually
                                                          marketing campaign, looking for patterns in financial
involves using database techniques such as spatial
                                                          transactions to discover illegal activities or analyzing
indexes. These patterns can then be seen as a kind
                                                          genome sequences.[1]
of summary of the input data, and may be used in
further analysis or, for example, in machine
                                                          For mining decisions data can be grouped according
learning and predictive analytics. As the internet
                                                          to the following categories:
has been involved in all areas of human activity,
there are increasing concerns that data mining            •Data classes: Stored data is used to locate data in
may pose a threat to our privacy and security then        predetermined groups.
security would be one of the major issues to
monitor. In this paper we present recent research         •Data clusters: Data items are grouped according to
on data mining and its security. We prepare a             logical relationships or consumer preferences.
survey report on data mining for crime detection.
                                                          •Data associations: Data can be mined to identify
                                                          associations.

Index Terms: data mining and security, intrusion          •Sequential patterns: Data is mined to anticipate
detection, terrorist attack.                              behavior patterns and trends.

                                                                                                                  78
                                     All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
    International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE)
                                                                             Volume 1, Issue 6, August 2012

      II. POSSIBLE THREATS TO SECURITY                          D.Intrusion Detection


A.Predict information about classified work from                 An intrusion can be defined as "any set of actions
correlation with unclassified work:                             that   attempt        to   compromise   the    integrity,
                                                                confidentiality or availability of a resource". Intrusion
Classification is a data mining technique used to               prevention techniques, such as user authentication
predict group membership for data instances in which            (e.g. using passwords or biometrics), avoiding
data instances are classified based on their feature            programming errors, and information protection (e.g.,
values. Predictive analysis could be applied to predict         encryption) have been used to protect computer
future patterns by providing a record of the past that          systems as a first line of defense.[5] Intrusion
can be analyzed more effectively on classified data.            detection system produces reports and intrusion
Unclassified work may involve duplicate and                     prevention system is placed in-line and is able to
redundant data which is difficult to manage.[2]                 actively prevent or block intrusions that are detected.
                                                                Intrusion detection systems are to identify malicious
A correlation is an index of the strength of the
                                                                activity, log information about said activity and
relationship between two variables.
                                                                report activity.[2]

B.Detect     “hidden”       information      based      on
                                                                             III.TO IMPROVE SECURITY
“conspicuous” lack of information:

                                                                • For privacy concerns, one should be only authorized
Data mining techniques are basically used in
                                                                access to privacy sensitive information such as credit
detecting hidden information from the large amount
                                                                card transaction records, health care records,
of database. Query generators and data interpretation
                                                                biological traits, criminal investigation and ethnicity.
components combine with discovery driven systems
                                                                So various data mining enhancing techniques have
to reveal hidden data.
                                                                been developed to help protecting data. Databases
                                                                can employ a multilevel security model to classify
C.Mining       “Open Source” data to determine
                                                                and restrict data according to various security levels,
predictive events:
                                                                with user permitted access to only their authority

Predictive analysis is a way to use data to predict             levels.[2]

future patterns. It is an area of statistical analysis that
                                                                • For security concerns, data mining can be used for
deals with extracting information from data and using
                                                                crime detection and prevention using various
it to predict future trends and behavior patterns. The
                                                                techniques such as TIA program ( Terrorism
core of predictive analytics relies on capturing
                                                                Information awareness) this project was to focus on
relationships between explanatory variables and the
                                                                three specific areas of research i.e. language
predicted variables from past occurrences, and
                                                                translation, data search with pattern recognition and
exploiting it to predict future outcome.
                                                                privacy protection, and advanced collaborative and

                                                                                                                      79
                                           All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
    International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE)
                                                                             Volume 1, Issue 6, August 2012

decision supportive tools.[9] CAPPS-II ( Computer -           We are in initial stage of our research, much remains
assisted Passenger Prescreening System), In this              to be done including the following task:
system, When a person books a plane ticket, certain
identifying information is collected by the airline: full     In TIA program person identification must not based

name, address, etc. This information is used to check         on statistical approach i.e. comparing with a standard

against some data store (e.g., a TSA No-Fly list,             model and known behavioral patterns , we are trying

the FBI ten most wanted fugitive list etc.) and assign        to design some technology based analysis tool for

a terrorism "risk score" to that person. High risk            Terrorism Information Awareness program.

scores require the airline to subject the person to
extended baggage and/or personal screening, and to
contact law enforcement if necessary. MATRIX
                                                                               REFERENCES
(Multistate Anti-terrorism Information Exchange)
which leverages advanced computer management                  [1]www.anderson.ucla.edu/faculty/jason.frand/teache

capabilities to more quickly access, share and analyze        r/.../datamining.htm

public records to help law enforcement generate               [2] Jiawei Han, Micheline kamber, Jian Pei Data

leads, expedite investigations, and possibly prevent          mining concepts and techniques

terrorist attacks.[3]
                                                              [3]William J. Krouse The Multi-State Anti-Terrorism
               IV. CONCLUSION                                 Information Exchange (MATRIX) Pilot Project

Though data mining involves data analysis tools to
                                                              [4] Gerhard PAAß1, Wolf REINHARDT, Stefan
discover previously unknown valid patterns and
                                                              RÜPING, and Stefan WROBEL Data Mining for
relationships in large data sets, and in TIA (Terrorism
                                                              Security and Crime Detection
Information Awareness) program, a data mining
application is designed to identify potential terrorist
                                                              [5] Wenke Lee and Salvatore J. Stolfo Data Mining
suspects in a large pool of individuals using statistical
                                                              Approaches for Intrusion Detection
approach in which the user is tested against the
predesigned model that includes information about
                                                              [6] Sushmita Mitra, Sankar K. Pal, Pabitra Mitra
known terrorists. However, while possibly re-
                                                              Data Mining in Soft Computing Framework: A
affirming a particular profile, it does not necessarily
                                                              survey
mean that the application will identify an individual
whose behavior significantly deviates from the
                                                              [7] Varun Chandola, Eric Eilertson, Levent ErtÄoz,
original model or an individual may be considered as
                                                              GyÄorgy Simon and Vipin Kumar Data mining for
a suspect if some information is found same as in
                                                              cyber security
original model.


                  V .FUTURE WORK

                                                                                                                 80
                                         All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
   International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE)
                                                                            Volume 1, Issue 6, August 2012

[8] Bhavani Thuraisingham, Latifur Khan,
Mohammad M. Masud, Kevin W. Hamlen Data
Mining for Security Applications


[9] Jeffrey W. Seifert Data Mining and Homeland
Security:An Overview


[10] Anshu Veda, Prajakta Kalekar, Anirudha
Bodhankar Intrusion Detection Using Datamining
Techniques

Author’s profile

Swati Vashisht has done bachelors in Information
Technology and pursuing Masters in Computer
Science & Engineering. Her area of interest is Data
mining & warehousing & Operating System.

Divya Singh has done bachelors in Computer
Science & Engg. and pursuing Masters in CSE from
Amity University. Her area of interest is Computer
Networks & Data mining.

Bhanu Prakash Lohani has done bachelors in
Computer Science & Engg. and pursuing Masters in
CSE from Amity University. His area of interest is
Computer Networks & Data mining.




                                                                                                       81
                                     All Rights Reserved © 2012 IJARCSEE

More Related Content

What's hot

SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...Editor IJMTER
 
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...IJSRD
 
Exploring Process Barriers to Release Public Sector Information in Local Gove...
Exploring Process Barriers to Release Public Sector Information in Local Gove...Exploring Process Barriers to Release Public Sector Information in Local Gove...
Exploring Process Barriers to Release Public Sector Information in Local Gove...Peter Conradie
 
Using Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data MiningUsing Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data Mining14894
 
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...Editor IJMTER
 
Constructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detectionConstructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detectionAlebachew Chiche
 
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and ApproachesA Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches14894
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data miningNeeda Multani
 
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data MiningPerformance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Miningidescitation
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh tManesh T
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
 
Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...eSAT Journals
 
Privacy Preserving Data Mining
Privacy Preserving Data MiningPrivacy Preserving Data Mining
Privacy Preserving Data MiningVrushali Malvadkar
 
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...IJECEIAES
 
Color Image Encryption for Secure Transfer over Internet: A survey
Color Image Encryption for Secure Transfer over Internet: A surveyColor Image Encryption for Secure Transfer over Internet: A survey
Color Image Encryption for Secure Transfer over Internet: A surveyIRJET Journal
 
Cryptography for privacy preserving data mining
Cryptography for privacy preserving data miningCryptography for privacy preserving data mining
Cryptography for privacy preserving data miningMesbah Uddin Khan
 
Privacy preserving dm_ppt
Privacy preserving dm_pptPrivacy preserving dm_ppt
Privacy preserving dm_pptSagar Verma
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data miningeSAT Publishing House
 
Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...DataCards
 

What's hot (20)

SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
 
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
 
Exploring Process Barriers to Release Public Sector Information in Local Gove...
Exploring Process Barriers to Release Public Sector Information in Local Gove...Exploring Process Barriers to Release Public Sector Information in Local Gove...
Exploring Process Barriers to Release Public Sector Information in Local Gove...
 
Using Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data MiningUsing Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data Mining
 
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
 
Constructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detectionConstructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detection
 
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and ApproachesA Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
 
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data MiningPerformance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh t
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
 
Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...
 
Privacy Preserving Data Mining
Privacy Preserving Data MiningPrivacy Preserving Data Mining
Privacy Preserving Data Mining
 
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
 
Bh32379384
Bh32379384Bh32379384
Bh32379384
 
Color Image Encryption for Secure Transfer over Internet: A survey
Color Image Encryption for Secure Transfer over Internet: A surveyColor Image Encryption for Secure Transfer over Internet: A survey
Color Image Encryption for Secure Transfer over Internet: A survey
 
Cryptography for privacy preserving data mining
Cryptography for privacy preserving data miningCryptography for privacy preserving data mining
Cryptography for privacy preserving data mining
 
Privacy preserving dm_ppt
Privacy preserving dm_pptPrivacy preserving dm_ppt
Privacy preserving dm_ppt
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data mining
 
Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...
 

Similar to 78 81

A Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection SystemA Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection SystemIOSRjournaljce
 
A Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data MiningA Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data MiningBRNSSPublicationHubI
 
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...IJORCS
 
Application of Data Science in Cybersecurity.pptx
Application of Data Science in Cybersecurity.pptxApplication of Data Science in Cybersecurity.pptx
Application of Data Science in Cybersecurity.pptxchristinacammillus20
 
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack DetectionA Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detectionijsrd.com
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionIOSR Journals
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applicationsSubrat Swain
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
D0261019025
D0261019025D0261019025
D0261019025theijes
 
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS cscpconf
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesIJRES Journal
 
A LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMININGA LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMININGCarrie Romero
 
Study on Data Mining Suitability for Intrusion Detection System (IDS)
Study on Data Mining Suitability for Intrusion Detection System (IDS)Study on Data Mining Suitability for Intrusion Detection System (IDS)
Study on Data Mining Suitability for Intrusion Detection System (IDS)ijdmtaiir
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data miningDatamining Tools
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data miningDataminingTools Inc
 
Data mining in Cyber security
Data mining in Cyber securityData mining in Cyber security
Data mining in Cyber securityPsychoCryGaming
 
Final review m score
Final review m scoreFinal review m score
Final review m scoreazhar4010
 
V1_I1_2012_Paper3.docx
V1_I1_2012_Paper3.docxV1_I1_2012_Paper3.docx
V1_I1_2012_Paper3.docxpraveena06
 

Similar to 78 81 (20)

A Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection SystemA Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection System
 
A Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data MiningA Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data Mining
 
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
 
Application of Data Science in Cybersecurity.pptx
Application of Data Science in Cybersecurity.pptxApplication of Data Science in Cybersecurity.pptx
Application of Data Science in Cybersecurity.pptx
 
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack DetectionA Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applications
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Gp3112671275
Gp3112671275Gp3112671275
Gp3112671275
 
D0261019025
D0261019025D0261019025
D0261019025
 
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
 
Kg2417521755
Kg2417521755Kg2417521755
Kg2417521755
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational Databases
 
A LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMININGA LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMINING
 
Study on Data Mining Suitability for Intrusion Detection System (IDS)
Study on Data Mining Suitability for Intrusion Detection System (IDS)Study on Data Mining Suitability for Intrusion Detection System (IDS)
Study on Data Mining Suitability for Intrusion Detection System (IDS)
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
 
Data mining in Cyber security
Data mining in Cyber securityData mining in Cyber security
Data mining in Cyber security
 
Final review m score
Final review m scoreFinal review m score
Final review m score
 
V1_I1_2012_Paper3.docx
V1_I1_2012_Paper3.docxV1_I1_2012_Paper3.docx
V1_I1_2012_Paper3.docx
 

More from Ijarcsee Journal (20)

130 133
130 133130 133
130 133
 
122 129
122 129122 129
122 129
 
116 121
116 121116 121
116 121
 
109 115
109 115109 115
109 115
 
104 108
104 108104 108
104 108
 
99 103
99 10399 103
99 103
 
93 98
93 9893 98
93 98
 
88 92
88 9288 92
88 92
 
82 87
82 8782 87
82 87
 
73 77
73 7773 77
73 77
 
65 72
65 7265 72
65 72
 
58 64
58 6458 64
58 64
 
52 57
52 5752 57
52 57
 
46 51
46 5146 51
46 51
 
41 45
41 4541 45
41 45
 
36 40
36 4036 40
36 40
 
28 35
28 3528 35
28 35
 
24 27
24 2724 27
24 27
 
19 23
19 2319 23
19 23
 
16 18
16 1816 18
16 18
 

Recently uploaded

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Recently uploaded (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

78 81

  • 1. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE) Volume 1, Issue 6, August 2012 Security threats to data mining and analysis tools of TIA program Swati Vashisht Divya Singh Bhanu Prakash Lohani Lecturer at CSE deptt Lecturer at CSE deptt Lecturer at CSE deptt. DIT SE Gr. Noida DIT SE Gr. Noida DIT SE Gr. Noida I. INTRODUCTION Abstract: Data mining is the process that attempts Data mining is the process of discovering new to discover patterns in large data sets. The actual patterns from large data sets involving methods at the data mining task is the automatic or semi- intersection of artificial intelligence, machine automatic analysis of large quantities of data to learning, statistics and data base system. It is the extract previously unknown interesting patterns process of analyzing data from different perspectives such as groups of data records i.e.cluster analysis, and summarizing it into useful information, unusual records (anomaly detection) and information that can predict the success of a dependencies association rule mining. This usually marketing campaign, looking for patterns in financial involves using database techniques such as spatial transactions to discover illegal activities or analyzing indexes. These patterns can then be seen as a kind genome sequences.[1] of summary of the input data, and may be used in further analysis or, for example, in machine For mining decisions data can be grouped according learning and predictive analytics. As the internet to the following categories: has been involved in all areas of human activity, there are increasing concerns that data mining •Data classes: Stored data is used to locate data in may pose a threat to our privacy and security then predetermined groups. security would be one of the major issues to monitor. In this paper we present recent research •Data clusters: Data items are grouped according to on data mining and its security. We prepare a logical relationships or consumer preferences. survey report on data mining for crime detection. •Data associations: Data can be mined to identify associations. Index Terms: data mining and security, intrusion •Sequential patterns: Data is mined to anticipate detection, terrorist attack. behavior patterns and trends. 78 All Rights Reserved © 2012 IJARCSEE
  • 2. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE) Volume 1, Issue 6, August 2012 II. POSSIBLE THREATS TO SECURITY D.Intrusion Detection A.Predict information about classified work from An intrusion can be defined as "any set of actions correlation with unclassified work: that attempt to compromise the integrity, confidentiality or availability of a resource". Intrusion Classification is a data mining technique used to prevention techniques, such as user authentication predict group membership for data instances in which (e.g. using passwords or biometrics), avoiding data instances are classified based on their feature programming errors, and information protection (e.g., values. Predictive analysis could be applied to predict encryption) have been used to protect computer future patterns by providing a record of the past that systems as a first line of defense.[5] Intrusion can be analyzed more effectively on classified data. detection system produces reports and intrusion Unclassified work may involve duplicate and prevention system is placed in-line and is able to redundant data which is difficult to manage.[2] actively prevent or block intrusions that are detected. Intrusion detection systems are to identify malicious A correlation is an index of the strength of the activity, log information about said activity and relationship between two variables. report activity.[2] B.Detect “hidden” information based on III.TO IMPROVE SECURITY “conspicuous” lack of information: • For privacy concerns, one should be only authorized Data mining techniques are basically used in access to privacy sensitive information such as credit detecting hidden information from the large amount card transaction records, health care records, of database. Query generators and data interpretation biological traits, criminal investigation and ethnicity. components combine with discovery driven systems So various data mining enhancing techniques have to reveal hidden data. been developed to help protecting data. Databases can employ a multilevel security model to classify C.Mining “Open Source” data to determine and restrict data according to various security levels, predictive events: with user permitted access to only their authority Predictive analysis is a way to use data to predict levels.[2] future patterns. It is an area of statistical analysis that • For security concerns, data mining can be used for deals with extracting information from data and using crime detection and prevention using various it to predict future trends and behavior patterns. The techniques such as TIA program ( Terrorism core of predictive analytics relies on capturing Information awareness) this project was to focus on relationships between explanatory variables and the three specific areas of research i.e. language predicted variables from past occurrences, and translation, data search with pattern recognition and exploiting it to predict future outcome. privacy protection, and advanced collaborative and 79 All Rights Reserved © 2012 IJARCSEE
  • 3. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE) Volume 1, Issue 6, August 2012 decision supportive tools.[9] CAPPS-II ( Computer - We are in initial stage of our research, much remains assisted Passenger Prescreening System), In this to be done including the following task: system, When a person books a plane ticket, certain identifying information is collected by the airline: full In TIA program person identification must not based name, address, etc. This information is used to check on statistical approach i.e. comparing with a standard against some data store (e.g., a TSA No-Fly list, model and known behavioral patterns , we are trying the FBI ten most wanted fugitive list etc.) and assign to design some technology based analysis tool for a terrorism "risk score" to that person. High risk Terrorism Information Awareness program. scores require the airline to subject the person to extended baggage and/or personal screening, and to contact law enforcement if necessary. MATRIX REFERENCES (Multistate Anti-terrorism Information Exchange) which leverages advanced computer management [1]www.anderson.ucla.edu/faculty/jason.frand/teache capabilities to more quickly access, share and analyze r/.../datamining.htm public records to help law enforcement generate [2] Jiawei Han, Micheline kamber, Jian Pei Data leads, expedite investigations, and possibly prevent mining concepts and techniques terrorist attacks.[3] [3]William J. Krouse The Multi-State Anti-Terrorism IV. CONCLUSION Information Exchange (MATRIX) Pilot Project Though data mining involves data analysis tools to [4] Gerhard PAAß1, Wolf REINHARDT, Stefan discover previously unknown valid patterns and RÜPING, and Stefan WROBEL Data Mining for relationships in large data sets, and in TIA (Terrorism Security and Crime Detection Information Awareness) program, a data mining application is designed to identify potential terrorist [5] Wenke Lee and Salvatore J. Stolfo Data Mining suspects in a large pool of individuals using statistical Approaches for Intrusion Detection approach in which the user is tested against the predesigned model that includes information about [6] Sushmita Mitra, Sankar K. Pal, Pabitra Mitra known terrorists. However, while possibly re- Data Mining in Soft Computing Framework: A affirming a particular profile, it does not necessarily survey mean that the application will identify an individual whose behavior significantly deviates from the [7] Varun Chandola, Eric Eilertson, Levent ErtÄoz, original model or an individual may be considered as GyÄorgy Simon and Vipin Kumar Data mining for a suspect if some information is found same as in cyber security original model. V .FUTURE WORK 80 All Rights Reserved © 2012 IJARCSEE
  • 4. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE) Volume 1, Issue 6, August 2012 [8] Bhavani Thuraisingham, Latifur Khan, Mohammad M. Masud, Kevin W. Hamlen Data Mining for Security Applications [9] Jeffrey W. Seifert Data Mining and Homeland Security:An Overview [10] Anshu Veda, Prajakta Kalekar, Anirudha Bodhankar Intrusion Detection Using Datamining Techniques Author’s profile Swati Vashisht has done bachelors in Information Technology and pursuing Masters in Computer Science & Engineering. Her area of interest is Data mining & warehousing & Operating System. Divya Singh has done bachelors in Computer Science & Engg. and pursuing Masters in CSE from Amity University. Her area of interest is Computer Networks & Data mining. Bhanu Prakash Lohani has done bachelors in Computer Science & Engg. and pursuing Masters in CSE from Amity University. His area of interest is Computer Networks & Data mining. 81 All Rights Reserved © 2012 IJARCSEE