Cyber Space Security Assessment Case Study

Cyberspace is known as the digital electronic medium for the knowing range of securing in the cyberspace. Therefore the importance of inferring the reference measure in the form of assessment procedure to improve the knowledge and making the decision for the egovernment services. A series of the standards build on the application of data mining methods specifically represented as decision tress model, Logistic regression, association rules model, Bayesian network for making reference measurements, to measure the extent of securing the data, and the provided services. The authors discuss various types of cyber-attacks describing how data mining helps in detection and prevention of these attacks. A comparative analysis between a set of selected frameworks is presented. Finally this chapter imparts numbers of applications for the data mining Methodologies in Cyber Security. Results applied on the site of the authority for cleaning and beautifying Cairo governorate in Egypt.

[1]  Moustafa Ghanem,et al.  Real-Time Data Mining Methodology and a Supporting Framework , 2009, 2009 Third International Conference on Network and System Security.

[2]  Margaret H. Dunham,et al.  Data Mining: Introductory and Advanced Topics , 2002 .

[3]  Henda Hajjami Ben Ghézala,et al.  A Framework for Data Mining Based Multi-Agent: An Application to Spatial Data , 2005, WEC.

[4]  Bhavani M. Thuraisingham,et al.  Data mining and cyber security , 2003, Third International Conference on Quality Software, 2003. Proceedings..

[5]  Marc Dacier,et al.  Actionable Knowledge Discovery for Threats Intelligence Support Using a Multi-dimensional Data Mining Methodology , 2008, 2008 IEEE International Conference on Data Mining Workshops.

[6]  Daniel T. Larose,et al.  Discovering Knowledge in Data: An Introduction to Data Mining , 2005 .

[7]  Jaideep Vaidya,et al.  Privacy preserving collaborative filtering for SaaS enabling PaaS clouds , 2012, Journal of Cloud Computing: Advances, Systems and Applications.

[8]  Yun Chen,et al.  Probabilistic Techniques for Corporate Blog Mining , 2007, PAKDD Workshops.

[9]  Marco Mellia,et al.  Characterization of community based-P2P systems and implications for traffic localization , 2012, Peer-to-Peer Networking and Applications.

[10]  Padhraic Smyth,et al.  From Data Mining to Knowledge Discovery in Databases , 1996, AI Mag..

[11]  Yingqin Zheng,et al.  Intelligence Techniques in Computer Security and Forensics: At the Boundaries of Ethics and Law , 2012, Computational Intelligence for Privacy and Security.

[12]  Rajesh Kumar,et al.  A review on particle swarm optimization algorithms and their applications to data clustering , 2011, Artificial Intelligence Review.

[13]  Eugene H. Spafford,et al.  Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense , 2009, ISIPS.