Data Mining for Security Applications

Bhavani Thuraisingham, Latifur Khan, Mohammad M. Masud, Kevin W. Hamlen
2008 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing  
In this paper we discuss various data mining techniques that we have successfully applied for cyber security. These applications include but are not limited to malicious code detection by mining binary executables, network intrusion detection by mining network traffic, anomaly detection, and data stream mining. We summarize our achievements and current works at the University of Texas at Dallas on intrusion detection, and cyber-security research.
doi:10.1109/euc.2008.62 dblp:conf/euc/ThuraisinghamKMH08 fatcat:4qwlyc4v3faqtgm6hbbwfuyooa