IJRTI
International Journal for Research Trends and Innovation
International Peer Reviewed & Refereed Journals, Open Access Journal
ISSN Approved Journal No: 2456-3315 | Impact factor: 8.14 | ESTD Year: 2016
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 8.14 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

Call For Paper

For Authors

Forms / Download

Published Issue Details

Editorial Board

Other IMP Links

Facts & Figure

Impact Factor : 8.14

Issue per Year : 12

Volume Published : 11

Issue Published : 118

Article Submitted : 21604

Article Published : 8531

Total Authors : 22438

Total Reviewer : 805

Total Countries : 159

Indexing Partner

Licence

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Published Paper Details
Paper Title: A Comparative Analysis of Cyber Security in Network Systems for Data Mining
Authors Name: Dr. D. V. Bhavsagar
Download E-Certificate: Download
Author Reg. ID:
IJRTI_184191
Published Paper Id: IJRTI2209100
Published In: Volume 7 Issue 9, September-2022
DOI:
Abstract: Ensuring the integrity of computer networks, both in relation to security and with regard to the institutional life of the state in general, is a matter of concern. Security and defense networks, proprietary research, intellectual property, and data based market mechanisms that are based on unimpeded and accurate access, can all be severely compromised by malicious intrusions. We need to find the best way to protect these systems. Addition to this we need techniques to detect and identify security breaches. Data mining has many applications in security including in national security (e.g., surveillance) as well as in cyber security (e.g., virus detection). The threats to national wide security include attacking and destroying critical infrastructures such as power grids and telecommunication systems. Data mining techniques are being used to identify suspicious individuals and groups, and to discover which individuals and groups are capable of carrying out terrorist activities. Cyber security is concerned with protecting computer and network systems from corruption due to malicious software including viruses and Trojan horses. Data mining is also being applied to provide solutions such as intrusion detection and auditing. In this paper we discuss various data mining techniques that we have successfully applied for cyber security. These applications include but are not restricted to network intrusion detection by mining network traffic, malicious code detection by mining binary executables, data stream mining and anomaly detection.
Keywords: Data Mining, Cyber security, malicious software, intrusion detection
Cite Article: "A Comparative Analysis of Cyber Security in Network Systems for Data Mining", International Journal for Research Trends and Innovation (www.ijrti.org), ISSN:2455-2631, Vol.7, Issue 9, page no.769 - 772, September-2022, Available :http://www.ijrti.org/papers/IJRTI2209100.pdf
Downloads: 000205317
ISSN: 2456-3315 | IMPACT FACTOR: 8.14 Calculated By Google Scholar| ESTD YEAR: 2016
An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 8.14 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator
Publication Details: Published Paper ID: IJRTI2209100
Registration ID:184191
Published In: Volume 7 Issue 9, September-2022
DOI (Digital Object Identifier):
Page No: 769 - 772
Country: -, -, India
Research Area: Engineering
Publisher : IJ Publication
Published Paper URL : https://www.ijrti.org/viewpaperforall?paper=IJRTI2209100
Published Paper PDF: https://www.ijrti.org/papers/IJRTI2209100
Share Article:

Click Here to Download This Article

Article Preview
Click Here to Download This Article

Major Indexing from www.ijrti.org
Google Scholar ResearcherID Thomson Reuters Mendeley : reference manager Academia.edu
arXiv.org : cornell university library Research Gate CiteSeerX DOAJ : Directory of Open Access Journals
DRJI Index Copernicus International Scribd DocStoc

ISSN Details

ISSN: 2456-3315
Impact Factor: 8.14 and ISSN APPROVED, Journal Starting Year (ESTD) : 2016

DOI (A digital object identifier)


Providing A digital object identifier by DOI.ONE
How to Get DOI?

Conference

Open Access License Policy

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License

Creative Commons License This material is Open Knowledge This material is Open Data This material is Open Content

Important Details

Join RMS/Earn 300

IJRTI

WhatsApp
Click Here

Indexing Partner