Skip to main content

2018 | Supplement | Buchkapitel

Between Data Mining and Predictive Analytics Techniques to Cybersecurity Protection on eLearning Environments

verfasst von : José Manuel, Raul Cordeiro, Carla Silva

Erschienen in: Applied Computational Intelligence and Mathematical Methods

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper aims to present a hypothetic theory of intelligent security system. In society the threat of cyber-attacks is getting louder and the use of computers, criminal activity has also changed from physical to cybernetic intrusion. There had been many cyber security solutions used to counteract these attacks, however we highlight the importance of self-protected systems in defense and in a correct analysis of cyber attacks. The internet is vulnerable to cyber-attacks as well as the information found in data systems and through a form of recognition and extraction of relevant information, we can represent data as shared data and integrated to intelligent system. What was used us a static firewall is now intended to be dynamic and self-critical. By techniques of data analysis, statistics, machine learning, data mining, the cybersecurity and privacy challenges are within our reach. This paper examines data mining techniques in order to predict pathways of Internet security and which considerations are involved in the theoretical solutions presented for the privacy systems such as the e-Learning environments.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
A decision tree is a tree data structure consisting of decision nodes and leaves. A leaf species is a class value. A decision node species a test over one of the attributes, which is called the attribute selected at the node. For each possible outcome of the test, a child node is present. In particular, the test on a discrete attribute A has h possible outcomes A = d1, …, A = dh, where d1;:::dh are the known values for attribute A. The test on a continuous attribute has two possible outcomes, A t and A > t, where t is a value determined at the node, and called the threshold [8].
 
Literatur
1.
Zurück zum Zitat Lin, T., Hinke, T., Marks, D., Thuraisingham, B.: Security and data mining. In: Database Security, pp. 391–399 (1996) Lin, T., Hinke, T., Marks, D., Thuraisingham, B.: Security and data mining. In: Database Security, pp. 391–399 (1996)
2.
Zurück zum Zitat Phridvi Raj, M.S.B., Guru Rao, C.V.: Data mining—past, present and future—a typical survey on data streams. Proc. Technol. 12, 255–263 (2014)CrossRef Phridvi Raj, M.S.B., Guru Rao, C.V.: Data mining—past, present and future—a typical survey on data streams. Proc. Technol. 12, 255–263 (2014)CrossRef
3.
Zurück zum Zitat Silva, J., Fonseca, C.: Educational data mining: a literature review. In: Advances in Intelligent Systems and Computing. Europe and MENA Cooperation Advances in Information and Communication Technologies (2016) Silva, J., Fonseca, C.: Educational data mining: a literature review. In: Advances in Intelligent Systems and Computing. Europe and MENA Cooperation Advances in Information and Communication Technologies (2016)
4.
Zurück zum Zitat Verma, R., Kantarcioglu, M., Marchette, D., Leiss, E., Solorio, T.: Security analytics: essential data analytics knowledge for cybersecurity professionals and students. IEEE Secur. Priv. 13(6), 60–65 (2015)CrossRef Verma, R., Kantarcioglu, M., Marchette, D., Leiss, E., Solorio, T.: Security analytics: essential data analytics knowledge for cybersecurity professionals and students. IEEE Secur. Priv. 13(6), 60–65 (2015)CrossRef
5.
Zurück zum Zitat Woody, C., Ellison, R., Nichols, W.: Predicting cybersecurity using quality data. In: 2015 IEEE International Symposium on Technologies for Homeland Security, HST 2015 (2015) Woody, C., Ellison, R., Nichols, W.: Predicting cybersecurity using quality data. In: 2015 IEEE International Symposium on Technologies for Homeland Security, HST 2015 (2015)
6.
Zurück zum Zitat Tobergte, D.R., Curtis, S.: Data manning 53(9) (2013) Tobergte, D.R., Curtis, S.: Data manning 53(9) (2013)
7.
Zurück zum Zitat Ruggieri, S.: Efficient C4. 5 [classification algorithm]. Knowl. Data Eng. IEEE Trans. 14(2), 438–444 (2002)CrossRef Ruggieri, S.: Efficient C4. 5 [classification algorithm]. Knowl. Data Eng. IEEE Trans. 14(2), 438–444 (2002)CrossRef
8.
Zurück zum Zitat Han, J., Kamber, M.: Data Mining: Concepts and Techniques, 2nd edn. Elsevier, San Francisco (2006)MATH Han, J., Kamber, M.: Data Mining: Concepts and Techniques, 2nd edn. Elsevier, San Francisco (2006)MATH
9.
Zurück zum Zitat Wu, X., Kumar, V., Ross Quinlan, J., Ghosh, J., Yang, Q., Motoda, H., McLachlan, G.J., Ng, A., Liu, B., Yu, P.S., Zhou, Z.-H., Steinbach, M., Hand, D.J., Steinberg, D.: Top 10 algorithms in data mining. Knowl. Inf. Syst. 14(1), 1–37 (2008)CrossRef Wu, X., Kumar, V., Ross Quinlan, J., Ghosh, J., Yang, Q., Motoda, H., McLachlan, G.J., Ng, A., Liu, B., Yu, P.S., Zhou, Z.-H., Steinbach, M., Hand, D.J., Steinberg, D.: Top 10 algorithms in data mining. Knowl. Inf. Syst. 14(1), 1–37 (2008)CrossRef
10.
Zurück zum Zitat Scambray, J., Mcclure, S., Kurtz, G.: Hackers Expostos. Pearson Education, London (2002) Scambray, J., Mcclure, S., Kurtz, G.: Hackers Expostos. Pearson Education, London (2002)
11.
Zurück zum Zitat Srivastava, J., Cooley, R., Deshpande, M., Tan, P.N.: Web usage mining: discovery and applications of usage patterns from web data. SIGKDD Explor. 1(2), 12–23 (2000)CrossRef Srivastava, J., Cooley, R., Deshpande, M., Tan, P.N.: Web usage mining: discovery and applications of usage patterns from web data. SIGKDD Explor. 1(2), 12–23 (2000)CrossRef
12.
Zurück zum Zitat Varghese, B.M., Jose Tomy, J., Unnikrishnan, A., Poulose, K.: Clustering student data to characterize performance patterns. Int. J. Adv. Comput. Sci. Appl. 2, 138–140 (2010) Varghese, B.M., Jose Tomy, J., Unnikrishnan, A., Poulose, K.: Clustering student data to characterize performance patterns. Int. J. Adv. Comput. Sci. Appl. 2, 138–140 (2010)
13.
Zurück zum Zitat Saliah-Hassane, H., Correia, R.C., Fonseca, J.M.: A network and repository for online laboratory, based on ontology. In: IEEE—2013 IEEE Global Engineering Education Conference, pp. 1177–1189, March 2013 Saliah-Hassane, H., Correia, R.C., Fonseca, J.M.: A network and repository for online laboratory, based on ontology. In: IEEE—2013 IEEE Global Engineering Education Conference, pp. 1177–1189, March 2013
Metadaten
Titel
Between Data Mining and Predictive Analytics Techniques to Cybersecurity Protection on eLearning Environments
verfasst von
José Manuel
Raul Cordeiro
Carla Silva
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-67621-0_17