期刊名称:International Journal of Computer Science and Information Technologies
电子版ISSN:0975-9646
出版年度:2014
卷号:5
期号:6
页码:8210-8213
出版社:TechScience Publications
摘要:In this paper we discuss various data mining techniques that we have successfully applied for cyber security. These applications include but are not limited to malicious code detection by mining binary executables, network intrusion detection by mining network traffic, anomaly detection, and data stream mining. Data mining-based intrusion-detection mechanisms are extremely useful in discovering security breaches.