SlideShare a Scribd company logo
1 of 4
Download to read offline
ISSN: 2277 – 9043
    International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE)
                                                                             Volume 1, Issue 6, August 2012




  Security threats to data mining and analysis
                               tools of TIA program
Swati Vashisht                    Divya Singh                        Bhanu Prakash Lohani
Lecturer at CSE deptt             Lecturer at CSE deptt              Lecturer at CSE deptt.
DIT SE Gr. Noida                  DIT SE Gr. Noida                   DIT SE Gr. Noida



                                                                           I. INTRODUCTION
Abstract: Data mining is the process that attempts
                                                          Data mining is the process of discovering new
to discover patterns in large data sets. The actual
                                                          patterns from large data sets involving methods at the
data mining task is the automatic or semi-
                                                          intersection    of   artificial     intelligence,   machine
automatic analysis of large quantities of data to
                                                          learning, statistics and data base system. It is the
extract previously unknown interesting patterns
                                                          process of analyzing data from different perspectives
such as groups of data records i.e.cluster analysis,
                                                          and   summarizing       it   into     useful   information,
unusual    records     (anomaly   detection)    and
                                                          information that can predict the success of a
dependencies association rule mining. This usually
                                                          marketing campaign, looking for patterns in financial
involves using database techniques such as spatial
                                                          transactions to discover illegal activities or analyzing
indexes. These patterns can then be seen as a kind
                                                          genome sequences.[1]
of summary of the input data, and may be used in
further analysis or, for example, in machine
                                                          For mining decisions data can be grouped according
learning and predictive analytics. As the internet
                                                          to the following categories:
has been involved in all areas of human activity,
there are increasing concerns that data mining            •Data classes: Stored data is used to locate data in
may pose a threat to our privacy and security then        predetermined groups.
security would be one of the major issues to
monitor. In this paper we present recent research         •Data clusters: Data items are grouped according to
on data mining and its security. We prepare a             logical relationships or consumer preferences.
survey report on data mining for crime detection.
                                                          •Data associations: Data can be mined to identify
                                                          associations.

Index Terms: data mining and security, intrusion          •Sequential patterns: Data is mined to anticipate
detection, terrorist attack.                              behavior patterns and trends.

                                                                                                                  78
                                     All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
    International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE)
                                                                             Volume 1, Issue 6, August 2012

      II. POSSIBLE THREATS TO SECURITY                          D.Intrusion Detection


A.Predict information about classified work from                 An intrusion can be defined as "any set of actions
correlation with unclassified work:                             that   attempt        to   compromise   the    integrity,
                                                                confidentiality or availability of a resource". Intrusion
Classification is a data mining technique used to               prevention techniques, such as user authentication
predict group membership for data instances in which            (e.g. using passwords or biometrics), avoiding
data instances are classified based on their feature            programming errors, and information protection (e.g.,
values. Predictive analysis could be applied to predict         encryption) have been used to protect computer
future patterns by providing a record of the past that          systems as a first line of defense.[5] Intrusion
can be analyzed more effectively on classified data.            detection system produces reports and intrusion
Unclassified work may involve duplicate and                     prevention system is placed in-line and is able to
redundant data which is difficult to manage.[2]                 actively prevent or block intrusions that are detected.
                                                                Intrusion detection systems are to identify malicious
A correlation is an index of the strength of the
                                                                activity, log information about said activity and
relationship between two variables.
                                                                report activity.[2]

B.Detect     “hidden”       information      based      on
                                                                             III.TO IMPROVE SECURITY
“conspicuous” lack of information:

                                                                • For privacy concerns, one should be only authorized
Data mining techniques are basically used in
                                                                access to privacy sensitive information such as credit
detecting hidden information from the large amount
                                                                card transaction records, health care records,
of database. Query generators and data interpretation
                                                                biological traits, criminal investigation and ethnicity.
components combine with discovery driven systems
                                                                So various data mining enhancing techniques have
to reveal hidden data.
                                                                been developed to help protecting data. Databases
                                                                can employ a multilevel security model to classify
C.Mining       “Open Source” data to determine
                                                                and restrict data according to various security levels,
predictive events:
                                                                with user permitted access to only their authority

Predictive analysis is a way to use data to predict             levels.[2]

future patterns. It is an area of statistical analysis that
                                                                • For security concerns, data mining can be used for
deals with extracting information from data and using
                                                                crime detection and prevention using various
it to predict future trends and behavior patterns. The
                                                                techniques such as TIA program ( Terrorism
core of predictive analytics relies on capturing
                                                                Information awareness) this project was to focus on
relationships between explanatory variables and the
                                                                three specific areas of research i.e. language
predicted variables from past occurrences, and
                                                                translation, data search with pattern recognition and
exploiting it to predict future outcome.
                                                                privacy protection, and advanced collaborative and

                                                                                                                      79
                                           All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
    International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE)
                                                                             Volume 1, Issue 6, August 2012

decision supportive tools.[9] CAPPS-II ( Computer -           We are in initial stage of our research, much remains
assisted Passenger Prescreening System), In this              to be done including the following task:
system, When a person books a plane ticket, certain
identifying information is collected by the airline: full     In TIA program person identification must not based

name, address, etc. This information is used to check         on statistical approach i.e. comparing with a standard

against some data store (e.g., a TSA No-Fly list,             model and known behavioral patterns , we are trying

the FBI ten most wanted fugitive list etc.) and assign        to design some technology based analysis tool for

a terrorism "risk score" to that person. High risk            Terrorism Information Awareness program.

scores require the airline to subject the person to
extended baggage and/or personal screening, and to
contact law enforcement if necessary. MATRIX
                                                                               REFERENCES
(Multistate Anti-terrorism Information Exchange)
which leverages advanced computer management                  [1]www.anderson.ucla.edu/faculty/jason.frand/teache

capabilities to more quickly access, share and analyze        r/.../datamining.htm

public records to help law enforcement generate               [2] Jiawei Han, Micheline kamber, Jian Pei Data

leads, expedite investigations, and possibly prevent          mining concepts and techniques

terrorist attacks.[3]
                                                              [3]William J. Krouse The Multi-State Anti-Terrorism
               IV. CONCLUSION                                 Information Exchange (MATRIX) Pilot Project

Though data mining involves data analysis tools to
                                                              [4] Gerhard PAAß1, Wolf REINHARDT, Stefan
discover previously unknown valid patterns and
                                                              RÜPING, and Stefan WROBEL Data Mining for
relationships in large data sets, and in TIA (Terrorism
                                                              Security and Crime Detection
Information Awareness) program, a data mining
application is designed to identify potential terrorist
                                                              [5] Wenke Lee and Salvatore J. Stolfo Data Mining
suspects in a large pool of individuals using statistical
                                                              Approaches for Intrusion Detection
approach in which the user is tested against the
predesigned model that includes information about
                                                              [6] Sushmita Mitra, Sankar K. Pal, Pabitra Mitra
known terrorists. However, while possibly re-
                                                              Data Mining in Soft Computing Framework: A
affirming a particular profile, it does not necessarily
                                                              survey
mean that the application will identify an individual
whose behavior significantly deviates from the
                                                              [7] Varun Chandola, Eric Eilertson, Levent ErtÄoz,
original model or an individual may be considered as
                                                              GyÄorgy Simon and Vipin Kumar Data mining for
a suspect if some information is found same as in
                                                              cyber security
original model.


                  V .FUTURE WORK

                                                                                                                 80
                                         All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
   International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE)
                                                                            Volume 1, Issue 6, August 2012

[8] Bhavani Thuraisingham, Latifur Khan,
Mohammad M. Masud, Kevin W. Hamlen Data
Mining for Security Applications


[9] Jeffrey W. Seifert Data Mining and Homeland
Security:An Overview


[10] Anshu Veda, Prajakta Kalekar, Anirudha
Bodhankar Intrusion Detection Using Datamining
Techniques

Author’s profile

Swati Vashisht has done bachelors in Information
Technology and pursuing Masters in Computer
Science & Engineering. Her area of interest is Data
mining & warehousing & Operating System.

Divya Singh has done bachelors in Computer
Science & Engg. and pursuing Masters in CSE from
Amity University. Her area of interest is Computer
Networks & Data mining.

Bhanu Prakash Lohani has done bachelors in
Computer Science & Engg. and pursuing Masters in
CSE from Amity University. His area of interest is
Computer Networks & Data mining.




                                                                                                       81
                                     All Rights Reserved © 2012 IJARCSEE

More Related Content

What's hot

SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...Editor IJMTER
 
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...IJSRD
 
Exploring Process Barriers to Release Public Sector Information in Local Gove...
Exploring Process Barriers to Release Public Sector Information in Local Gove...Exploring Process Barriers to Release Public Sector Information in Local Gove...
Exploring Process Barriers to Release Public Sector Information in Local Gove...Peter Conradie
 
Using Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data MiningUsing Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data Mining14894
 
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...Editor IJMTER
 
Constructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detectionConstructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detectionAlebachew Chiche
 
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and ApproachesA Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches14894
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data miningNeeda Multani
 
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data MiningPerformance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Miningidescitation
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh tManesh T
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
 
Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...eSAT Journals
 
Privacy Preserving Data Mining
Privacy Preserving Data MiningPrivacy Preserving Data Mining
Privacy Preserving Data MiningVrushali Malvadkar
 
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...IJECEIAES
 
Color Image Encryption for Secure Transfer over Internet: A survey
Color Image Encryption for Secure Transfer over Internet: A surveyColor Image Encryption for Secure Transfer over Internet: A survey
Color Image Encryption for Secure Transfer over Internet: A surveyIRJET Journal
 
Cryptography for privacy preserving data mining
Cryptography for privacy preserving data miningCryptography for privacy preserving data mining
Cryptography for privacy preserving data miningMesbah Uddin Khan
 
Privacy preserving dm_ppt
Privacy preserving dm_pptPrivacy preserving dm_ppt
Privacy preserving dm_pptSagar Verma
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data miningeSAT Publishing House
 
Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...DataCards
 

What's hot (20)

SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
 
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
A Survey Paper on an Integrated Approach for Privacy Preserving In High Dimen...
 
Exploring Process Barriers to Release Public Sector Information in Local Gove...
Exploring Process Barriers to Release Public Sector Information in Local Gove...Exploring Process Barriers to Release Public Sector Information in Local Gove...
Exploring Process Barriers to Release Public Sector Information in Local Gove...
 
Using Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data MiningUsing Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data Mining
 
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
 
Constructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detectionConstructing a predictive model for an intelligent network intrusion detection
Constructing a predictive model for an intelligent network intrusion detection
 
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and ApproachesA Review Study on the Privacy Preserving Data Mining Techniques and Approaches
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
 
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data MiningPerformance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
Performance Analysis of Hybrid Approach for Privacy Preserving in Data Mining
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh t
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
 
Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...Secure and privacy preserving data centric sensor networks with multi query o...
Secure and privacy preserving data centric sensor networks with multi query o...
 
Privacy Preserving Data Mining
Privacy Preserving Data MiningPrivacy Preserving Data Mining
Privacy Preserving Data Mining
 
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...Improved method for image security based on chaotic-shuffle and chaotic-diffu...
Improved method for image security based on chaotic-shuffle and chaotic-diffu...
 
Bh32379384
Bh32379384Bh32379384
Bh32379384
 
Color Image Encryption for Secure Transfer over Internet: A survey
Color Image Encryption for Secure Transfer over Internet: A surveyColor Image Encryption for Secure Transfer over Internet: A survey
Color Image Encryption for Secure Transfer over Internet: A survey
 
Cryptography for privacy preserving data mining
Cryptography for privacy preserving data miningCryptography for privacy preserving data mining
Cryptography for privacy preserving data mining
 
Privacy preserving dm_ppt
Privacy preserving dm_pptPrivacy preserving dm_ppt
Privacy preserving dm_ppt
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data mining
 
Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...Information Extraction and Integration of Hard and Soft Information for D2D v...
Information Extraction and Integration of Hard and Soft Information for D2D v...
 

Similar to 78 81

A Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection SystemA Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection SystemIOSRjournaljce
 
A Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data MiningA Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data MiningBRNSSPublicationHubI
 
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...IJORCS
 
Application of Data Science in Cybersecurity.pptx
Application of Data Science in Cybersecurity.pptxApplication of Data Science in Cybersecurity.pptx
Application of Data Science in Cybersecurity.pptxchristinacammillus20
 
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack DetectionA Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detectionijsrd.com
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionIOSR Journals
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applicationsSubrat Swain
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
D0261019025
D0261019025D0261019025
D0261019025theijes
 
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS cscpconf
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesIJRES Journal
 
A LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMININGA LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMININGCarrie Romero
 
Study on Data Mining Suitability for Intrusion Detection System (IDS)
Study on Data Mining Suitability for Intrusion Detection System (IDS)Study on Data Mining Suitability for Intrusion Detection System (IDS)
Study on Data Mining Suitability for Intrusion Detection System (IDS)ijdmtaiir
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data miningDatamining Tools
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data miningDataminingTools Inc
 
Data mining in Cyber security
Data mining in Cyber securityData mining in Cyber security
Data mining in Cyber securityPsychoCryGaming
 
Final review m score
Final review m scoreFinal review m score
Final review m scoreazhar4010
 
V1_I1_2012_Paper3.docx
V1_I1_2012_Paper3.docxV1_I1_2012_Paper3.docx
V1_I1_2012_Paper3.docxpraveena06
 

Similar to 78 81 (20)

A Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection SystemA Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection System
 
A Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data MiningA Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data Mining
 
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
 
Application of Data Science in Cybersecurity.pptx
Application of Data Science in Cybersecurity.pptxApplication of Data Science in Cybersecurity.pptx
Application of Data Science in Cybersecurity.pptx
 
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack DetectionA Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
 
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionMultilevel Privacy Preserving by Linear and Non Linear Data Distortion
Multilevel Privacy Preserving by Linear and Non Linear Data Distortion
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applications
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Gp3112671275
Gp3112671275Gp3112671275
Gp3112671275
 
D0261019025
D0261019025D0261019025
D0261019025
 
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
 
Kg2417521755
Kg2417521755Kg2417521755
Kg2417521755
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational Databases
 
A LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMININGA LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMINING
 
Study on Data Mining Suitability for Intrusion Detection System (IDS)
Study on Data Mining Suitability for Intrusion Detection System (IDS)Study on Data Mining Suitability for Intrusion Detection System (IDS)
Study on Data Mining Suitability for Intrusion Detection System (IDS)
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
 
Data mining in Cyber security
Data mining in Cyber securityData mining in Cyber security
Data mining in Cyber security
 
Final review m score
Final review m scoreFinal review m score
Final review m score
 
V1_I1_2012_Paper3.docx
V1_I1_2012_Paper3.docxV1_I1_2012_Paper3.docx
V1_I1_2012_Paper3.docx
 

More from Ijarcsee Journal (20)

130 133
130 133130 133
130 133
 
122 129
122 129122 129
122 129
 
116 121
116 121116 121
116 121
 
109 115
109 115109 115
109 115
 
104 108
104 108104 108
104 108
 
99 103
99 10399 103
99 103
 
93 98
93 9893 98
93 98
 
88 92
88 9288 92
88 92
 
82 87
82 8782 87
82 87
 
73 77
73 7773 77
73 77
 
65 72
65 7265 72
65 72
 
58 64
58 6458 64
58 64
 
52 57
52 5752 57
52 57
 
46 51
46 5146 51
46 51
 
41 45
41 4541 45
41 45
 
36 40
36 4036 40
36 40
 
28 35
28 3528 35
28 35
 
24 27
24 2724 27
24 27
 
19 23
19 2319 23
19 23
 
16 18
16 1816 18
16 18
 

Recently uploaded

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

78 81

  • 1. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE) Volume 1, Issue 6, August 2012 Security threats to data mining and analysis tools of TIA program Swati Vashisht Divya Singh Bhanu Prakash Lohani Lecturer at CSE deptt Lecturer at CSE deptt Lecturer at CSE deptt. DIT SE Gr. Noida DIT SE Gr. Noida DIT SE Gr. Noida I. INTRODUCTION Abstract: Data mining is the process that attempts Data mining is the process of discovering new to discover patterns in large data sets. The actual patterns from large data sets involving methods at the data mining task is the automatic or semi- intersection of artificial intelligence, machine automatic analysis of large quantities of data to learning, statistics and data base system. It is the extract previously unknown interesting patterns process of analyzing data from different perspectives such as groups of data records i.e.cluster analysis, and summarizing it into useful information, unusual records (anomaly detection) and information that can predict the success of a dependencies association rule mining. This usually marketing campaign, looking for patterns in financial involves using database techniques such as spatial transactions to discover illegal activities or analyzing indexes. These patterns can then be seen as a kind genome sequences.[1] of summary of the input data, and may be used in further analysis or, for example, in machine For mining decisions data can be grouped according learning and predictive analytics. As the internet to the following categories: has been involved in all areas of human activity, there are increasing concerns that data mining •Data classes: Stored data is used to locate data in may pose a threat to our privacy and security then predetermined groups. security would be one of the major issues to monitor. In this paper we present recent research •Data clusters: Data items are grouped according to on data mining and its security. We prepare a logical relationships or consumer preferences. survey report on data mining for crime detection. •Data associations: Data can be mined to identify associations. Index Terms: data mining and security, intrusion •Sequential patterns: Data is mined to anticipate detection, terrorist attack. behavior patterns and trends. 78 All Rights Reserved © 2012 IJARCSEE
  • 2. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE) Volume 1, Issue 6, August 2012 II. POSSIBLE THREATS TO SECURITY D.Intrusion Detection A.Predict information about classified work from An intrusion can be defined as "any set of actions correlation with unclassified work: that attempt to compromise the integrity, confidentiality or availability of a resource". Intrusion Classification is a data mining technique used to prevention techniques, such as user authentication predict group membership for data instances in which (e.g. using passwords or biometrics), avoiding data instances are classified based on their feature programming errors, and information protection (e.g., values. Predictive analysis could be applied to predict encryption) have been used to protect computer future patterns by providing a record of the past that systems as a first line of defense.[5] Intrusion can be analyzed more effectively on classified data. detection system produces reports and intrusion Unclassified work may involve duplicate and prevention system is placed in-line and is able to redundant data which is difficult to manage.[2] actively prevent or block intrusions that are detected. Intrusion detection systems are to identify malicious A correlation is an index of the strength of the activity, log information about said activity and relationship between two variables. report activity.[2] B.Detect “hidden” information based on III.TO IMPROVE SECURITY “conspicuous” lack of information: • For privacy concerns, one should be only authorized Data mining techniques are basically used in access to privacy sensitive information such as credit detecting hidden information from the large amount card transaction records, health care records, of database. Query generators and data interpretation biological traits, criminal investigation and ethnicity. components combine with discovery driven systems So various data mining enhancing techniques have to reveal hidden data. been developed to help protecting data. Databases can employ a multilevel security model to classify C.Mining “Open Source” data to determine and restrict data according to various security levels, predictive events: with user permitted access to only their authority Predictive analysis is a way to use data to predict levels.[2] future patterns. It is an area of statistical analysis that • For security concerns, data mining can be used for deals with extracting information from data and using crime detection and prevention using various it to predict future trends and behavior patterns. The techniques such as TIA program ( Terrorism core of predictive analytics relies on capturing Information awareness) this project was to focus on relationships between explanatory variables and the three specific areas of research i.e. language predicted variables from past occurrences, and translation, data search with pattern recognition and exploiting it to predict future outcome. privacy protection, and advanced collaborative and 79 All Rights Reserved © 2012 IJARCSEE
  • 3. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE) Volume 1, Issue 6, August 2012 decision supportive tools.[9] CAPPS-II ( Computer - We are in initial stage of our research, much remains assisted Passenger Prescreening System), In this to be done including the following task: system, When a person books a plane ticket, certain identifying information is collected by the airline: full In TIA program person identification must not based name, address, etc. This information is used to check on statistical approach i.e. comparing with a standard against some data store (e.g., a TSA No-Fly list, model and known behavioral patterns , we are trying the FBI ten most wanted fugitive list etc.) and assign to design some technology based analysis tool for a terrorism "risk score" to that person. High risk Terrorism Information Awareness program. scores require the airline to subject the person to extended baggage and/or personal screening, and to contact law enforcement if necessary. MATRIX REFERENCES (Multistate Anti-terrorism Information Exchange) which leverages advanced computer management [1]www.anderson.ucla.edu/faculty/jason.frand/teache capabilities to more quickly access, share and analyze r/.../datamining.htm public records to help law enforcement generate [2] Jiawei Han, Micheline kamber, Jian Pei Data leads, expedite investigations, and possibly prevent mining concepts and techniques terrorist attacks.[3] [3]William J. Krouse The Multi-State Anti-Terrorism IV. CONCLUSION Information Exchange (MATRIX) Pilot Project Though data mining involves data analysis tools to [4] Gerhard PAAß1, Wolf REINHARDT, Stefan discover previously unknown valid patterns and RÜPING, and Stefan WROBEL Data Mining for relationships in large data sets, and in TIA (Terrorism Security and Crime Detection Information Awareness) program, a data mining application is designed to identify potential terrorist [5] Wenke Lee and Salvatore J. Stolfo Data Mining suspects in a large pool of individuals using statistical Approaches for Intrusion Detection approach in which the user is tested against the predesigned model that includes information about [6] Sushmita Mitra, Sankar K. Pal, Pabitra Mitra known terrorists. However, while possibly re- Data Mining in Soft Computing Framework: A affirming a particular profile, it does not necessarily survey mean that the application will identify an individual whose behavior significantly deviates from the [7] Varun Chandola, Eric Eilertson, Levent ErtÄoz, original model or an individual may be considered as GyÄorgy Simon and Vipin Kumar Data mining for a suspect if some information is found same as in cyber security original model. V .FUTURE WORK 80 All Rights Reserved © 2012 IJARCSEE
  • 4. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE) Volume 1, Issue 6, August 2012 [8] Bhavani Thuraisingham, Latifur Khan, Mohammad M. Masud, Kevin W. Hamlen Data Mining for Security Applications [9] Jeffrey W. Seifert Data Mining and Homeland Security:An Overview [10] Anshu Veda, Prajakta Kalekar, Anirudha Bodhankar Intrusion Detection Using Datamining Techniques Author’s profile Swati Vashisht has done bachelors in Information Technology and pursuing Masters in Computer Science & Engineering. Her area of interest is Data mining & warehousing & Operating System. Divya Singh has done bachelors in Computer Science & Engg. and pursuing Masters in CSE from Amity University. Her area of interest is Computer Networks & Data mining. Bhanu Prakash Lohani has done bachelors in Computer Science & Engg. and pursuing Masters in CSE from Amity University. His area of interest is Computer Networks & Data mining. 81 All Rights Reserved © 2012 IJARCSEE