Usage of Intelligent Data Mining Methodology in Cyber Security

Hanaa Mohammad Said Ibrahim;

Abstract


With the ever growing technology, its advantages and disadvantages are increasing; computer related crime is on the rise too. Technology is producing several negative impacts on society Internet hacking is worth noting. Cyber Security is the most serious issue around the world. Organizations wishing to ensure security of their systems may look towards adopting appropriate tests to protect themselves against potential security breaches. Cyberspace is known as the supposed space" it is the material space and the non- material space. It is consists of parts of all the following elements: computes; machinery device networks, and computerized information programs. It is known as the digital electronic medium for the knowing range of securing in the cyberspace with the available resources.

E-Government must ensure that; information systems are appropriately protected and individual rights are respected. The successful e-government project builds trust with any online service, Security is one of the most important issues that face the use of online services, also the Governments must be responsible custodians of the enormous amounts of personal information they hold. Security must be addressed in the phase of planning and designing of the e-government system. Management process is needed to assess security control, this management allows departments and agencies to maintain and measure the extent of data security depending on the mechanism of revealing the security weak points.

Data Mining is the process of automatically searching large volumes of data for patterns using association rules, for evaluating security threats related to the detection of cyber-attacks, moreover cybercrime, and information security. This thesis presents the analysis, studies for securing one of the minor cyber space's which the cyberspace of the authority of cleaning is and beautifying Cairo, Egypt (www.ccba.gov.eg), It is one of the important cyberspaces that provides -government services. Also we are testing Cyber space security provided by e-government systems through "suggested model (MADAM ID)" and securing the data in e-government systems. The proposed model, MADAM ID, has been used for knowing, and determining the effective and important characteristics from a citizen's point of view of solving the problems of the street sellers and overcoming its spread. The current application aims to legalize their situation in order to improve the civilized appearance and get rid of the randomness in the Egyptian streets. For solving the problems of the street sellers such as noise spread, traffic difficulties, violence, uncivilized appearance and then analyzing the data regarding the citizens' opinions about the street sellers for knowing their important characteristics as an indicator for solving this problem and overcoming the spread of this phenomenon.

This thesis, presents several techniques, algorithms, approaches and different areas of data mining technique models in cyber security from different perspectives. Then the study established a classification and comparison of various types of intrusion detection and countermeasures in E-government of this research. It reflects the important criteria of the data mining models. It summarizes various intelligent data analyses and presents an intelligent data Analysis of “Cairo Cleaning and Beautification Agency". Establishing such as classification impacts deeply guiding data mining applications towards better operations and performance. Moreover, knowing how data mining can help in the detection and prevention of these attacks.

The study uses the Mining Audit Data for Automated Models for Intrusion Detection (MADAM ID); using strategy of inferring, analyses the data, searches for them in the cyberspace by one of the technology tools (data mining). A series of the standards build on the application of data mining methods specifically represented as "Frequencies", "Logistic regression", "association rules model", "Bayesian network", "decision tress model", "Neural Networks Model", and "Hierarchical Clustering". So we analyse for making reference measurements. They form "penetration test model" to measure the extent of securing the data, and the provided services. Also this strategy is very useful to enable the decision-maker for monitoring to measure the extent of securing the cyberspace, and the provided services

In this thesis, it is found that the cyberspace needs to be improved and to enhance its sufficiency and taking the necessary arrangements to raise the efficiency of the security. The results of this study are very useful to build a strategy for measuring the extent of securing data in order to improve the management of effective government services. Any type of data to be used, any type of data was transferred in a proper way. This study could be remarkable as one of the first studies on the use of data mining tools in cyberspace. Moreover, these results could become important tools for the government and intelligence agencies in the decision-making and monitoring potential international terrorist threats in real time.


Other data

Title Usage of Intelligent Data Mining Methodology in Cyber Security
Other Titles إستخدام منهاجية تنقيب البيانات الذكية في أمن الفضاء السيبيري
Authors Hanaa Mohammad Said Ibrahim
Issue Date 2015

Attached Files

File SizeFormat
G8730.pdf845.19 kBAdobe PDFView/Open
Recommend this item

Similar Items from Core Recommender Database

Google ScholarTM

Check

views 4 in Shams Scholar
downloads 1 in Shams Scholar


Items in Ain Shams Scholar are protected by copyright, with all rights reserved, unless otherwise indicated.