Advertisement

Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques

  • Nazli Goharian
  • Ling Ma
  • Chris Meyers
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3495)

Abstract

Misuse detection is often based on file permissions. That is, each authorized user can only access certain files. Predetermining the mapping of documents to allowable users, however, is highly difficult in large document collections. Initially, we utilized information retrieval techniques to warn of potential misuse. Here, we describe some data mining extensions used in our detection approach.

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Nazli Goharian
    • 1
  • Ling Ma
    • 1
  • Chris Meyers
    • 1
  1. 1.Information Retrieval LaboratoryIllinois Institute of Technology 

Personalised recommendations