Introduction to The Data Mining Techniques in Cybersecurity

28Citations
Citations of this article
77Readers
Mendeley users who have this article in their library.

Abstract

As a result of the evolution of the Internet and the massive amount of data that is transmitted every second, as well as the methods for protecting and preserving it and distinguishing those who are authorized to view it, the role of cyber security has evolved to provide the best protection for information over the network. In this paper, the researcher discusses the role of data mining methods in cyber security. Data mining has several uses in security, including national security (for example, surveillance) and cyber security (e.g., virus detection). Attacks against buildings and the destruction of key infrastructure, such as power grids and telecommunications networks, are examples of national security concerns. Cybersecurity is concerned with safeguarding computer and network systems from harmful malware such as Trojan horses and viruses. In addition, data mining is being used to deliver solutions such as intrusion detection and auditing.

Cite

CITATION STYLE

APA

Salem, I. E., Mijwil, M. M., Abdulqader, A. W., Ismaeel, M. M., Alkhazraji, A., & Alaabdin, A. M. Z. (2022, December 10). Introduction to The Data Mining Techniques in Cybersecurity. Mesopotamian Journal of CyberSecurity. Mesopotamian Academic Press. https://doi.org/10.58496/MJCS/2022/004

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free