RESEARCH ON HETEREGENEOUS DATA FOR RECOGNIZING THREAT

Deris Stiawan, Abdul Hanan Abdullah, Mohd Yazid Idris

Abstract

The information increasingly large of volume dataset and multidimensional data has grown rapidly in recent years. Inter-related and update information from security communities or vendor network security has present of content vulnerability and patching bug from new attack (pattern) methods. It given a collection of datasets, we were asked to examine a sample of such data and look for pattern which may exist between certain pattern methods over time. There are several challenges, including handling dynamic data, sparse data, incomplete data, uncertain data, and semistructured/unstructured data. In this paper, we are addressing these challenges and using data mining approach to collecting scattered information in routine update regularly from provider or security community.

References

  1. Abe, H. & Tsumoto, S., 2009. Detection of Trends of Technical Phrases in Text Mining. IEEE International Conference on Granular Computing, pp. 7-12.
  2. Adeva, J. G., Manuel, J. & Atxa, P., 2007. Intrusion detection in web applications using text mining. Engineering Applications of Artificial Intelligence, 20, pp. 555-566.
  3. Al Fawareh, H. M. et al., 2008. Ambiguity in Text Mining. Proceedings of the International Conference on Computer and Communication Engineering 2008, pp. 1172-1176.
  4. Junqi, W. & Zhengbing, H., 2008. Study of Intrusion Detection Systems ( IDSs ) in Network Security. IEEE. Wireless Communications, Networking and Mobile Computing. WICOM 08, pp. 1-4.
  5. Lopes, A. A. et al., 2007. Visual text mining using association rules. Computers & Graphics, 31, pp. 316- 326.
  6. Martin, R. A., 2001. Managing Vulnerabilities in Networked Systems. Computer, 34(11), pp. 32-38.
  7. Romero, C. & Ventura, S., 2007. Educational data mining: A survey from 1995 to 2005. Expert Systems with Applications, 33, pp. 135-146.
  8. Sanchez, D. et al., 2008. Text Knowledge Mining: An Alternative to Text Data Mining. Knowledge Creation Diffusion Utilization.
  9. Singhal, A., 2007. Data Warehousing and Data Mining Techiques for Cyber Security 31st ed., Advance in Information Security Springer.
  10. Tsang, P. P. et al., 2009. Nymble: Blocking Misbehaving Users in Anonymizing Networks. IEEE Transaction Dependable and secure computing, pp. 1-15.
  11. Witten, I. H. et al., 1999. Text mining: a new frontier for lossless compression. Proceedings DCC 1999 Data Compression Conference, pp. 198-207.
  12. Zhang, W., Yoshida, T. & Tang, X., 2008. KnowledgeBased Systems Text classification based on multiword with support vector machine. Knowledge-Based Systems, 21(8), pp. 879-886.
  13. Zhou, Z., Song, T. & Jia, Y., 2010. A High-Performance URL Lookup Engine for URL Filtering Systems. IEEE ICC 2010, pp. 1-5.
Download


Paper Citation


in Harvard Style

Stiawan D., Hanan Abdullah A. and Yazid Idris M. (2011). RESEARCH ON HETEREGENEOUS DATA FOR RECOGNIZING THREAT . In Proceedings of the 6th International Conference on Software and Database Technologies - Volume 1: ICSOFT, ISBN 978-989-8425-76-8, pages 222-225. DOI: 10.5220/0003596502220225


in Bibtex Style

@conference{icsoft11,
author={Deris Stiawan and Abdul Hanan Abdullah and Mohd Yazid Idris},
title={RESEARCH ON HETEREGENEOUS DATA FOR RECOGNIZING THREAT},
booktitle={Proceedings of the 6th International Conference on Software and Database Technologies - Volume 1: ICSOFT,},
year={2011},
pages={222-225},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003596502220225},
isbn={978-989-8425-76-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 6th International Conference on Software and Database Technologies - Volume 1: ICSOFT,
TI - RESEARCH ON HETEREGENEOUS DATA FOR RECOGNIZING THREAT
SN - 978-989-8425-76-8
AU - Stiawan D.
AU - Hanan Abdullah A.
AU - Yazid Idris M.
PY - 2011
SP - 222
EP - 225
DO - 10.5220/0003596502220225