SlideShare a Scribd company logo
2
Most read
7
Most read
17
Most read
Data Mining in Cyber Security Intrusion Detection
Presented by : Sagar Deepak Thapa
Guided By : Prof Nagaraju Bogiri
KJ College Of Engineering And Management Research Pune
4072
Outline
What is Cyber Security?
What is Cyber Crime?
Applications of Data Mining in Cyber Security.
Intrusion detection.
Why Can Data Mining Help?
Data Mining approaches for Intrusion Detection.
Conclusion.
Cyber Security
Set of technologies and processes designed to protect computers,
networks, programs, and data from attack, unauthorized access, change,
or destruction.
A Majorpart of Cyber Security
is to fix broken Software.
Cyber
Security
Computer
SecuritySystem
Network
SecuritySystem
Cyber Crime
Encompasses anycriminal act dealingwith computers and networks.
Include:
• Malicious programs.
• Illegal imports.
• Computers Vandalism.
Cyber Security VS CyberCrime
Cyber
Security
CyberCrime CyberSecurity
Cyber
Crime
One side of the
coin
Other side of the
coin
Applications of Data Mining in Cyber Security
Malwaredetection.
Intrusion detection.
Fraud detection.
Intrusion Detection
The process of monitoring the events occurring in a computer systemor
network and analyzing them for signs of intrusion.
Intrusion Detection System (IDS)
Combination of software and hardware that attempts to perform
intrusion detection.
Raise the alarm when possible intrusion happens.
Steps:
 Monitoring and analyzing traffic.
 Identifying abnormal activities.
 Assessing severity and raisingalarm.
Detector – ID Engine
Response
Component
Data gathering (sensors)
Raw data
Information Source - Monitored System
Events
Knowledge base Configuration
Alarms
Actions
SystemState
System
State
Intrusion Detection System Architecture
Goals of Intrusion Detection System (IDS)
Detect wide variety of intrusions.
Detect intrusions in timelyfashion.
Present analysis in simple, easy-to-understand format.
Be accurate.
WhyWeNeed Intrusion Detection?
Security mechanisms always have inevitable vulnerabilities.
Multiple levels of data confidentiality in commercial and government
organizations needs multi-layer protection in firewalls.
Why Can Data MiningHelp?
 Successful applications in related domains, e.g., fraud detection,
fault/alarm management.
 Learn from traffic data
 Maintain or update models on dynamic data.
 Data mining: applying specific algorithms to extract patterns from
data.
 From the data-centric point view
, intrusion detection is a data
analysisprocess.
Data Mining approaches for Intrusion Detection
Classification Methods
 Neural networks.
 Bayesian classification.
 Support vector
machines.
Email Worm Detection Using Data Mining
Outgoing Emails
TrainingData
TestData
Classifier
Feature
Extraction
Machine
Learning
Themodel
CleanorInfected
Clustering
Group data into clusters
ClusteringApproaches
• K-means
• Hierarchical Clustering
Clustering for Intrusion Detection
Anomaly detection.
Any significant deviations from the expected behavior are reported as
possible attacks.
Build clusters as models for normal activities.
Conclusion
Data mining has great potential as a malware detection tool. It allows you
to analyze huge sets of information and extract new knowledge from it.
The main benefit of using data mining techniques for detecting
malicious software is the ability to identify both known and zero-day
attacks.
THANK YOU

More Related Content

PPTX
Role of data mining in cyber security
PPTX
Introduction to Data Mining and Data Warehousing
PPTX
Text Analytics Presentation
PPTX
Data Mining
PPTX
The 8 Step Data Mining Process
PPTX
Privacy, security and ethics in data science
PPTX
Text mining
PPTX
Knowledge discovery process
Role of data mining in cyber security
Introduction to Data Mining and Data Warehousing
Text Analytics Presentation
Data Mining
The 8 Step Data Mining Process
Privacy, security and ethics in data science
Text mining
Knowledge discovery process

What's hot (20)

PPTX
Role of data mining in cyber security
PDF
HOW AI CAN HELP IN CYBERSECURITY
PPTX
Introduction to IDS & IPS - Part 1
PDF
Cyber Attack Analysis
PPTX
Presentation_Malware Analysis.pptx
PDF
Topics in network security
PPT
data mining for security application
PPT
Intrusion Detection System
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PPTX
Cse ethical hacking ppt
PPTX
Intrusion detection system
PDF
Cyber Threat Intelligence
PDF
Understanding Cyber Attack - Cyber Kill Chain.pdf
PPTX
Botnet Detection in Online-social Network
PPT
Need for security
PPTX
Browser forensics
PPTX
Deep learning approach for network intrusion detection system
PPTX
E mail forensics
Role of data mining in cyber security
HOW AI CAN HELP IN CYBERSECURITY
Introduction to IDS & IPS - Part 1
Cyber Attack Analysis
Presentation_Malware Analysis.pptx
Topics in network security
data mining for security application
Intrusion Detection System
Security operations center-SOC Presentation-مرکز عملیات امنیت
Cse ethical hacking ppt
Intrusion detection system
Cyber Threat Intelligence
Understanding Cyber Attack - Cyber Kill Chain.pdf
Botnet Detection in Online-social Network
Need for security
Browser forensics
Deep learning approach for network intrusion detection system
E mail forensics
Ad

Similar to Data mining in Cyber security (20)

PDF
C3602021025
PDF
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
PPTX
Analysis and Design for Intrusion Detection System Based on Data Mining
PDF
Vol 6 No 1 - October 2013
PDF
Ak03402100217
PDF
The Practical Data Mining Model for Efficient IDS through Relational Databases
PDF
Intrusion detection system: classification, techniques and datasets to implement
PDF
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
PDF
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
PPTX
DM for IDS
PPT
data mining for security application
PDF
Intrusion Detection System Using Machine Learning: An Overview
PDF
A Survey on Various Data Mining Technique in Intrusion Detection System
PDF
Bt33430435
PDF
Bt33430435
PDF
A Study on Data Mining Based Intrusion Detection System
PDF
Volume 2-issue-6-2190-2194
PDF
Volume 2-issue-6-2190-2194
PDF
A Comprehensive Review On Intrusion Detection System And Techniques
C3602021025
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
Analysis and Design for Intrusion Detection System Based on Data Mining
Vol 6 No 1 - October 2013
Ak03402100217
The Practical Data Mining Model for Efficient IDS through Relational Databases
Intrusion detection system: classification, techniques and datasets to implement
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
DM for IDS
data mining for security application
Intrusion Detection System Using Machine Learning: An Overview
A Survey on Various Data Mining Technique in Intrusion Detection System
Bt33430435
Bt33430435
A Study on Data Mining Based Intrusion Detection System
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
A Comprehensive Review On Intrusion Detection System And Techniques
Ad

Recently uploaded (20)

PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Well-logging-methods_new................
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
PPT on Performance Review to get promotions
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPT
Mechanical Engineering MATERIALS Selection
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Structs to JSON How Go Powers REST APIs.pdf
PDF
Digital Logic Computer Design lecture notes
PPTX
web development for engineering and engineering
PPTX
Lecture Notes Electrical Wiring System Components
PPT
Project quality management in manufacturing
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
DOCX
573137875-Attendance-Management-System-original
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
UNIT 4 Total Quality Management .pptx
CH1 Production IntroductoryConcepts.pptx
Well-logging-methods_new................
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
CYBER-CRIMES AND SECURITY A guide to understanding
PPT on Performance Review to get promotions
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Strings in CPP - Strings in C++ are sequences of characters used to store and...
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Mechanical Engineering MATERIALS Selection
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Structs to JSON How Go Powers REST APIs.pdf
Digital Logic Computer Design lecture notes
web development for engineering and engineering
Lecture Notes Electrical Wiring System Components
Project quality management in manufacturing
Lesson 3_Tessellation.pptx finite Mathematics
573137875-Attendance-Management-System-original
UNIT-1 - COAL BASED THERMAL POWER PLANTS

Data mining in Cyber security

  • 1. Data Mining in Cyber Security Intrusion Detection Presented by : Sagar Deepak Thapa Guided By : Prof Nagaraju Bogiri KJ College Of Engineering And Management Research Pune 4072
  • 2. Outline What is Cyber Security? What is Cyber Crime? Applications of Data Mining in Cyber Security. Intrusion detection. Why Can Data Mining Help? Data Mining approaches for Intrusion Detection. Conclusion.
  • 3. Cyber Security Set of technologies and processes designed to protect computers, networks, programs, and data from attack, unauthorized access, change, or destruction. A Majorpart of Cyber Security is to fix broken Software. Cyber Security Computer SecuritySystem Network SecuritySystem
  • 4. Cyber Crime Encompasses anycriminal act dealingwith computers and networks. Include: • Malicious programs. • Illegal imports. • Computers Vandalism.
  • 5. Cyber Security VS CyberCrime Cyber Security CyberCrime CyberSecurity Cyber Crime One side of the coin Other side of the coin
  • 6. Applications of Data Mining in Cyber Security Malwaredetection. Intrusion detection. Fraud detection.
  • 7. Intrusion Detection The process of monitoring the events occurring in a computer systemor network and analyzing them for signs of intrusion.
  • 8. Intrusion Detection System (IDS) Combination of software and hardware that attempts to perform intrusion detection. Raise the alarm when possible intrusion happens. Steps:  Monitoring and analyzing traffic.  Identifying abnormal activities.  Assessing severity and raisingalarm.
  • 9. Detector – ID Engine Response Component Data gathering (sensors) Raw data Information Source - Monitored System Events Knowledge base Configuration Alarms Actions SystemState System State Intrusion Detection System Architecture
  • 10. Goals of Intrusion Detection System (IDS) Detect wide variety of intrusions. Detect intrusions in timelyfashion. Present analysis in simple, easy-to-understand format. Be accurate.
  • 11. WhyWeNeed Intrusion Detection? Security mechanisms always have inevitable vulnerabilities. Multiple levels of data confidentiality in commercial and government organizations needs multi-layer protection in firewalls.
  • 12. Why Can Data MiningHelp?  Successful applications in related domains, e.g., fraud detection, fault/alarm management.  Learn from traffic data  Maintain or update models on dynamic data.  Data mining: applying specific algorithms to extract patterns from data.  From the data-centric point view , intrusion detection is a data analysisprocess.
  • 13. Data Mining approaches for Intrusion Detection
  • 14. Classification Methods  Neural networks.  Bayesian classification.  Support vector machines.
  • 15. Email Worm Detection Using Data Mining Outgoing Emails TrainingData TestData Classifier Feature Extraction Machine Learning Themodel CleanorInfected
  • 16. Clustering Group data into clusters ClusteringApproaches • K-means • Hierarchical Clustering
  • 17. Clustering for Intrusion Detection Anomaly detection. Any significant deviations from the expected behavior are reported as possible attacks. Build clusters as models for normal activities.
  • 18. Conclusion Data mining has great potential as a malware detection tool. It allows you to analyze huge sets of information and extract new knowledge from it. The main benefit of using data mining techniques for detecting malicious software is the ability to identify both known and zero-day attacks.