Data Mining for Security Applications [chapter]

Bhavani M. Thuraisingham
2006 Lecture Notes in Computer Science  
In this paper we discuss various data mining techniques that we have successfully applied for cyber security. These applications include but are not limited to malicious code detection by mining binary executables, network intrusion detection by mining network traffic, anomaly detection, and data stream mining. We summarize our achievements and current works at the University of Texas at Dallas on intrusion detection, and cyber-security research.
doi:10.1007/11734628_1 fatcat:6zbh5l4hjffl5mnqo5rxoj5hpm