Open Access

Data Mining Usage in Corporate Information Security: Intrusion Detection Applications


Cite

1. Baesens, B., Mues, C., Martens, D., Vanthienen, J. (2009), “50 years of data mining and OR: upcoming trends and challenges“, Journal of the Operational Research Society, Vol. 60, pp. S16-S23.Search in Google Scholar

2. Bose, R. (2006), “Intelligent technologies for managing fraud and identity theft“, in Third International Conference on Information Technology: New Generations, (ITNG 2006), IEEE, pp. 446-451.10.1109/ITNG.2006.78Search in Google Scholar

3. Chen, W. H., Hsu, S. H., Shen, H. P. (2005), “Application of SVM and ANN for intrusion detection“, Computors & Operations Research, Vol. 32 No. 10, pp. 2617-2634.10.1016/j.cor.2004.03.019Search in Google Scholar

4. Chen, Y., Abraham, A., Yang, B. (2007), “Hybrid flexible neural‐tree‐based intrusion detection systems”, International Journal of Intelligent Systems, Vol. 22 No. 4, pp. 337-352.10.1002/int.20203Search in Google Scholar

5. Dlamini, M. T., Eloff, J. H., Eloff, M. M. (2009), “Information security: The moving target“, Computers & Security, Vol. 28 No. 3-4, pp. 189-198.10.1016/j.cose.2008.11.007Search in Google Scholar

6. Fienberg, S. E. (2006), “Privacy and confidentiality in an e-commerce world: Data mining, data warehousing, matching and disclosure limitation”, Statistical Science, Vol. 21 No. 2, pp. 143-154.10.1214/088342306000000240Search in Google Scholar

7. Greene, S. S. (2006). Security Policies and Procedures, New Jersey, Pearson Education.Search in Google Scholar

8. Herath, T., Rao, H. R. (2009), “Protection motivation and deterrence: a framework for security policy compliance in organisations“, European Journal of Information Systems, Vol. 18 No. 2, pp. 106-125.10.1057/ejis.2009.6Search in Google Scholar

9. Ishiguro, M., Tanaka, H., Matsuura, K., Murase, I. (2006), “The effect of information security incidents on corporate values in the Japanese stock market”, in International Workshop on the Economics of Securing the Information Infrastructure (WESII).Search in Google Scholar

10. Kim, J., Bentley, P. J., Aickelin, U., Greensmith, J., Tedesco, G., Twycross, J. (2007), “Immune system approaches to intrusion detection - a review”, Natural computing, Vol. 6 No. 4, pp. 413-466.10.1007/s11047-006-9026-4Search in Google Scholar

11. Kim, Y., Chang, H. (2014), “The industrial security management model for SMBs in smart work”, Journal of Intelligent Manufacturing, Vol. 25 No. 2, pp. 319-327.10.1007/s10845-012-0651-8Search in Google Scholar

12. Matatov, N., Rokach, L., Maimon, O. (2010), “Privacy-preserving data mining: A feature set partitioning approach”, Information Sciences, Vol. 180 No. 14, pp. 2696-2720.10.1016/j.ins.2010.03.011Search in Google Scholar

13. Mlitwa, N. B. W., Birch, D. (2011), “The role of intrusion detection systems in electronic information security: From the activity theory perspective”, Journal of Engineering, Design and Technology, Vol. 9 No. 3, pp. 296-312.10.1108/17260531111179915Search in Google Scholar

14. Mohammad, M. N., Sulaiman, N., Abdulkarim Muhsin, O. (2011), “A Novel Intrusion Detection System by using Intelligent Data Mining in Weka Environment“, Procedia Computer Science, Vol. 3 No. 5, pp. 1237-1242.10.1016/j.procs.2010.12.198Search in Google Scholar

15. Pejic-Bach, M. (2010), “Profiling Intelligent Systems Applications in Fraud Detection and Prevention: Survey of Research Articles“, 2010 International Conference on Intelligent Systems, Modelling and Simulation (ISMS), IEEE, pp. 80-85.10.1109/ISMS.2010.26Search in Google Scholar

16. Sayed, M., Jradi, F. (2014), “Biometrics: Effectiveness and Applications within the Blended Learning Environment”, Computer Engineering and Intelligent Systems, Vol. 5 No. 5, pp. 1-8.Search in Google Scholar

17. Stoel, M. D., Muhanna, W. A. (2011), “IT internal control weaknesses and firm performance: An organizational liability lens“, International Journal of Accounting Information Systems, Vol. 12 No. 4, pp. 280-304.10.1016/j.accinf.2011.06.001Search in Google Scholar

18. Thamaraiselvi, G., Kaliammal, A. (2004), “Data mining: concepts and techniques”, SRELS Journal of Information Management, Vol. 41 No. 4, pp. 339-348.Search in Google Scholar

19. Theoharidou, M., Kokolakis, S., Karyda, M., Kiountouzis, E. (2005), “The insider threat to information systems and the effectiveness of ISO17799“, Computers & Security, Vol. 24 No. 6, pp. 472-484.10.1016/j.cose.2005.05.002Search in Google Scholar

20. Toval, A., Nicolás, J., Moros, B., García, F. (2002), “Requirements reuse for improving information systems security: a practitioner’s approach”, Requirements Engineering, Vol. 6 No. 4, pp. 205-219.10.1007/PL00010360Search in Google Scholar

21. Trompeter, C. M., Eloff, J. H. P. (2001), “A framework for the implementation of socio-ethical controls in information security”, Computers & Security, Vol. 20 No. 5, pp. 384-391.10.1016/S0167-4048(01)00507-7Search in Google Scholar

22. Viega, J. (2009), “Cloud computing and the common man“, Computer, Vol. 42 No. 8, pp. 106-108.10.1109/MC.2009.252Search in Google Scholar

23. Vigna, G., Kemmerer, R. A. (1999), “NetSTAT: A network-based intrusion detection system”, Journal of computer security, Vol. 7 No. 1, pp. 37-71.10.3233/JCS-1999-7103Search in Google Scholar

24. Von Solms, B., Von Solms, R. (2004), “The 10 deadly sins of information security management”, Computers & Security, Vol. 23 No. 5, pp. 371-376.10.1016/j.cose.2004.05.002Search in Google Scholar

25. Whitman, M. E., Mattord, H. J. (2010). Principles of information security, Cengage Learning.Search in Google Scholar

26. Willison, R. (2006), “Understanding the perpetration of employee computer crime in the organisational context“, Information and organization, Vol. 16 No. 4, pp. 304-324.10.1016/j.infoandorg.2006.08.001Search in Google Scholar

27. Workman, M. (2007), “Gaining access with social engineering: An empirical study of the threat“, Information Systems Security, Vol. 16 No. 6, pp. 315-331.10.1080/10658980701788165Search in Google Scholar

28. Yeh, Q. J., Chang, A. J. T. (2007), “Threats and countermeasures for information system security: A cross-industry study“, Information & Management, Vol. 44 No. 5, pp. 480-491.10.1016/j.im.2007.05.003Search in Google Scholar

29. Yen, E. C. (2007), “Warning signals for potential accounting frauds in blue chip companies - An application of adaptive resonance theory“, Information Sciences, Vol. 177 No. 20, pp. 4515-4525.10.1016/j.ins.2007.03.034Search in Google Scholar

30. Yu, Z., Tsai, J. J. P. (2007), “An Automatically Tuning Intrusion Detection System“, IEEE Transactions on Systems, Man, and Cybernetics - Part B: Cybernetics, Vol. 37 No. 2, pp. 373-384.10.1109/TSMCB.2006.885306Search in Google Scholar

31. Zhu, D., Premkumar, G., Zhang, X., Chu, C-H. (2001), “Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods“, Decision Sciences, Vol. 32 No. 4, pp. 635-660.10.1111/j.1540-5915.2001.tb00975.xSearch in Google Scholar

eISSN:
1847-9375
Language:
English