Abstract
This paper aims to present a hypothetic theory of intelligent security system. In society the threat of cyber-attacks is getting louder and the use of computers, criminal activity has also changed from physical to cybernetic intrusion. There had been many cyber security solutions used to counteract these attacks, however we highlight the importance of self-protected systems in defense and in a correct analysis of cyber attacks. The internet is vulnerable to cyber-attacks as well as the information found in data systems and through a form of recognition and extraction of relevant information, we can represent data as shared data and integrated to intelligent system. What was used us a static firewall is now intended to be dynamic and self-critical. By techniques of data analysis, statistics, machine learning, data mining, the cybersecurity and privacy challenges are within our reach. This paper examines data mining techniques in order to predict pathways of Internet security and which considerations are involved in the theoretical solutions presented for the privacy systems such as the e-Learning environments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
A decision tree is a tree data structure consisting of decision nodes and leaves. A leaf species is a class value. A decision node species a test over one of the attributes, which is called the attribute selected at the node. For each possible outcome of the test, a child node is present. In particular, the test on a discrete attribute A has h possible outcomes A = d1, …, A = dh, where d1;:::dh are the known values for attribute A. The test on a continuous attribute has two possible outcomes, A t and A > t, where t is a value determined at the node, and called the threshold [8].
References
Lin, T., Hinke, T., Marks, D., Thuraisingham, B.: Security and data mining. In: Database Security, pp. 391–399 (1996)
Phridvi Raj, M.S.B., Guru Rao, C.V.: Data mining—past, present and future—a typical survey on data streams. Proc. Technol. 12, 255–263 (2014)
Silva, J., Fonseca, C.: Educational data mining: a literature review. In: Advances in Intelligent Systems and Computing. Europe and MENA Cooperation Advances in Information and Communication Technologies (2016)
Verma, R., Kantarcioglu, M., Marchette, D., Leiss, E., Solorio, T.: Security analytics: essential data analytics knowledge for cybersecurity professionals and students. IEEE Secur. Priv. 13(6), 60–65 (2015)
Woody, C., Ellison, R., Nichols, W.: Predicting cybersecurity using quality data. In: 2015 IEEE International Symposium on Technologies for Homeland Security, HST 2015 (2015)
Tobergte, D.R., Curtis, S.: Data manning 53(9) (2013)
Ruggieri, S.: Efficient C4. 5 [classification algorithm]. Knowl. Data Eng. IEEE Trans. 14(2), 438–444 (2002)
Han, J., Kamber, M.: Data Mining: Concepts and Techniques, 2nd edn. Elsevier, San Francisco (2006)
Wu, X., Kumar, V., Ross Quinlan, J., Ghosh, J., Yang, Q., Motoda, H., McLachlan, G.J., Ng, A., Liu, B., Yu, P.S., Zhou, Z.-H., Steinbach, M., Hand, D.J., Steinberg, D.: Top 10 algorithms in data mining. Knowl. Inf. Syst. 14(1), 1–37 (2008)
Scambray, J., Mcclure, S., Kurtz, G.: Hackers Expostos. Pearson Education, London (2002)
Srivastava, J., Cooley, R., Deshpande, M., Tan, P.N.: Web usage mining: discovery and applications of usage patterns from web data. SIGKDD Explor. 1(2), 12–23 (2000)
Varghese, B.M., Jose Tomy, J., Unnikrishnan, A., Poulose, K.: Clustering student data to characterize performance patterns. Int. J. Adv. Comput. Sci. Appl. 2, 138–140 (2010)
Saliah-Hassane, H., Correia, R.C., Fonseca, J.M.: A network and repository for online laboratory, based on ontology. In: IEEE—2013 IEEE Global Engineering Education Conference, pp. 1177–1189, March 2013
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Manuel, J., Cordeiro, R., Silva, C. (2018). Between Data Mining and Predictive Analytics Techniques to Cybersecurity Protection on eLearning Environments. In: Silhavy, R., Silhavy, P., Prokopova, Z. (eds) Applied Computational Intelligence and Mathematical Methods. CoMeSySo 2017. Advances in Intelligent Systems and Computing, vol 662. Springer, Cham. https://doi.org/10.1007/978-3-319-67621-0_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-67621-0_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-67620-3
Online ISBN: 978-3-319-67621-0
eBook Packages: EngineeringEngineering (R0)