Skip to main content

Between Data Mining and Predictive Analytics Techniques to Cybersecurity Protection on eLearning Environments

  • Conference paper
  • First Online:
Applied Computational Intelligence and Mathematical Methods (CoMeSySo 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 662))

Included in the following conference series:

Abstract

This paper aims to present a hypothetic theory of intelligent security system. In society the threat of cyber-attacks is getting louder and the use of computers, criminal activity has also changed from physical to cybernetic intrusion. There had been many cyber security solutions used to counteract these attacks, however we highlight the importance of self-protected systems in defense and in a correct analysis of cyber attacks. The internet is vulnerable to cyber-attacks as well as the information found in data systems and through a form of recognition and extraction of relevant information, we can represent data as shared data and integrated to intelligent system. What was used us a static firewall is now intended to be dynamic and self-critical. By techniques of data analysis, statistics, machine learning, data mining, the cybersecurity and privacy challenges are within our reach. This paper examines data mining techniques in order to predict pathways of Internet security and which considerations are involved in the theoretical solutions presented for the privacy systems such as the e-Learning environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    A decision tree is a tree data structure consisting of decision nodes and leaves. A leaf species is a class value. A decision node species a test over one of the attributes, which is called the attribute selected at the node. For each possible outcome of the test, a child node is present. In particular, the test on a discrete attribute A has h possible outcomes A = d1, …, A = dh, where d1;:::dh are the known values for attribute A. The test on a continuous attribute has two possible outcomes, A t and A > t, where t is a value determined at the node, and called the threshold [8].

References

  1. Lin, T., Hinke, T., Marks, D., Thuraisingham, B.: Security and data mining. In: Database Security, pp. 391–399 (1996)

    Google Scholar 

  2. Phridvi Raj, M.S.B., Guru Rao, C.V.: Data mining—past, present and future—a typical survey on data streams. Proc. Technol. 12, 255–263 (2014)

    Article  Google Scholar 

  3. Silva, J., Fonseca, C.: Educational data mining: a literature review. In: Advances in Intelligent Systems and Computing. Europe and MENA Cooperation Advances in Information and Communication Technologies (2016)

    Google Scholar 

  4. Verma, R., Kantarcioglu, M., Marchette, D., Leiss, E., Solorio, T.: Security analytics: essential data analytics knowledge for cybersecurity professionals and students. IEEE Secur. Priv. 13(6), 60–65 (2015)

    Article  Google Scholar 

  5. Woody, C., Ellison, R., Nichols, W.: Predicting cybersecurity using quality data. In: 2015 IEEE International Symposium on Technologies for Homeland Security, HST 2015 (2015)

    Google Scholar 

  6. Tobergte, D.R., Curtis, S.: Data manning 53(9) (2013)

    Google Scholar 

  7. Ruggieri, S.: Efficient C4. 5 [classification algorithm]. Knowl. Data Eng. IEEE Trans. 14(2), 438–444 (2002)

    Article  Google Scholar 

  8. Han, J., Kamber, M.: Data Mining: Concepts and Techniques, 2nd edn. Elsevier, San Francisco (2006)

    MATH  Google Scholar 

  9. Wu, X., Kumar, V., Ross Quinlan, J., Ghosh, J., Yang, Q., Motoda, H., McLachlan, G.J., Ng, A., Liu, B., Yu, P.S., Zhou, Z.-H., Steinbach, M., Hand, D.J., Steinberg, D.: Top 10 algorithms in data mining. Knowl. Inf. Syst. 14(1), 1–37 (2008)

    Article  Google Scholar 

  10. Scambray, J., Mcclure, S., Kurtz, G.: Hackers Expostos. Pearson Education, London (2002)

    Google Scholar 

  11. Srivastava, J., Cooley, R., Deshpande, M., Tan, P.N.: Web usage mining: discovery and applications of usage patterns from web data. SIGKDD Explor. 1(2), 12–23 (2000)

    Article  Google Scholar 

  12. Varghese, B.M., Jose Tomy, J., Unnikrishnan, A., Poulose, K.: Clustering student data to characterize performance patterns. Int. J. Adv. Comput. Sci. Appl. 2, 138–140 (2010)

    Google Scholar 

  13. Saliah-Hassane, H., Correia, R.C., Fonseca, J.M.: A network and repository for online laboratory, based on ontology. In: IEEE—2013 IEEE Global Engineering Education Conference, pp. 1177–1189, March 2013

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Carla Silva .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Manuel, J., Cordeiro, R., Silva, C. (2018). Between Data Mining and Predictive Analytics Techniques to Cybersecurity Protection on eLearning Environments. In: Silhavy, R., Silhavy, P., Prokopova, Z. (eds) Applied Computational Intelligence and Mathematical Methods. CoMeSySo 2017. Advances in Intelligent Systems and Computing, vol 662. Springer, Cham. https://doi.org/10.1007/978-3-319-67621-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67621-0_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67620-3

  • Online ISBN: 978-3-319-67621-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics