Abstract
An overview of several applications of techniques and models of data mining (DM) in applied information security systems is presented. Special focus is put on the new and actively developed area of cloud-based computing environments. Both the available and future applicabilities of models and techniques of artificial intelligence to IS problem solving are discussed.
Similar content being viewed by others
References
Information Security Doctrine of the Russian Federation (approved by the President of the Russian Federation on September 9, 2000, N Pr-1895). http://www.scrf.gov.ru/documents/5.html
Voronina, Yu., Ross. Gaz., 2015, no. 984. http://www.rg.ru/printable/2015/02/10/ib.html
Zakharov, V.A., Smelyanskii, R.L., and Chemeritskii, E.V., The formal model and verification problems of software-configurable networks, Model. Anal. Inf. Sist., 2013, vol. 20, no. 6, pp. 33–48.
Zakharov, V.A. and Chemeritskii, E.V., Some problems of reconfiguration of software-configurable networks, Model. Anal. Inf. Sist., 2014, vol. 21, no. 6, pp. 57–70.
GOST (State Standard) R ISO/IEC 15408-1-2008: Information Technology. Methods and Means of Ensuring Safety. Criteria for Information Technology Security Evaluation, 2008.
Ashby, R.W., An Introduction to Cybernetics, London: Chapman & Hall, 1956. http://pcp.vub.ac.be/ASHB-BOOK.html
Denning, D.E., An intrusion detection model, Proceedings of the Seventh IEEE Symposium on Security and Privacy, 1986, pp. 119–131.
Lunt, T.F., Detecting intruders in computer systems, Proceedings of the 1993 conference on auditing and computer technology. http://www.researchgate.net/profile/Teresa_Lunt/publication/2304057_Detecting_Intruders_in_Computer_Systems/links/552e86500cf2acd38cba5c94.pdf
Anderson, D., Lunt, T.F., Javitz, H., Tamaru, A., and Valdes, A., Detecting Unusual Program Behavior Using the Statistical Component of the Next-Generation Intrusion Detection Expert System (NIDES), SRI International, Computer Science Laboratory. http://www.csl.sri.com/papers/5sri/5sri.pdf
Vaccaro, H.S. and Liepins, G.E., Detection of anomalous computer session activity, The 1989 IEEE Symposium on Security and Privacy, Oakland, CA, 1989, pp. 280–289.
Teng, H.S., Chen, K., and Lu, S.C-Y., Adaptive realtime anomaly detection using inductively generated sequential patterns, IEEE Symposium on Security and Privacy, 1990, pp. 278–284.
Catalog of Means for Information Protection. http://zlonov.ru/catalog/
Drozd, A., Review of corporate IPS-solutions in the Russian market. http://www.anti-malware.ru/IPS_russian_market_review_2013
Intrusion Prevention Systems. Moxize: IT Solution Discovery & Research. http://www.moxize.com/Category/Detail/20/intrusion-prevention-systems
USENIX Security’14 (23-th USENIX Security Symposium), San Diego, CA, 2014. http://www.usenix.org/conference/usenixsecurity14
IEEE Symposium on Security and Privacy, San Jose, CA, 2014. http://www.ieee-security.org/TC/SP2014/index.html
Financial Action Task Force13. http://www.fatf-gafi.org/
VISA: Fraud Prevention Tools & Real Time Fraud Detection. http://usa.visa.com/personal/security/security-program/index.jsp
FORTUNE: 100 Best Companies to Work for. SAS Institute. http://fortune.com/best-companies/sas-institute-4/
SAS Institute (Inc.). Patent Applications. http://www.faqs.org/patents/assignee/sas-institute-inc/
Intel Security. http://www.intelsecurity.com/
Clark, D., Intel Lead $100 Million Investment into Mirantis, The Wall Street Journal, Aug. 24, 2015. http://www.wsj.com/articles/intel-to-lead-100-millioninvestment-into-mirantis-1440388913
Zhu, W.-D., Foyle, B., Gagné, D., Gupta, V., Magdalen, J., Mund I, A.S., Nasukawa, T., Paulis, M., Singer, J., and Triska, M., IBM Watson Content Analytics: Discovering Actionable Insight from Your Content, IBM Redbooks: IBM Corp., 2014, 3rd ed. http://www.redbooks.ibm.com/abstracts/sg247877.html?Open
Bagchi, S., Barborak, M.A., Buchanan, D.W., ChuCarroll, J., Ferrucci, D.A., Glass, M.R., Kalyanpur, A., Mueller, E.T., Murdock, J.W., Patwardhan, S., Prager, J.M., and Welty, C.A., WatsonPaths: ScenarioBased Question Answering and Inference over Unstructured Information (IBM Research Report RC25489), Yorktown Heights, NY: IBM Thomas J. Watson Research Center, 2014. http://www.patwardhans.net/papers/LallyEtAl14.pdf
BMC, Remedy. http://www.bmc.com/it-solutions/remedy-itsm.html
BMC Software, Eucalyptus, HP, IBM, Intel, Red Hat and SUSE Create Open Virtualization Alliance. https://openvirtualizationalliance.org/news-events/news/2011/05/bmc-software-eucalyptus-hp-ibm-intel-red-hatand-suse-create-open
HP Open View. Enterprise Security. http://www8.hp.com/us/en/software-solutions/enterprise-security.html
Carasso, D., Splunk, CITO Research, 2013.
Carasso, D., Data Mining with Splunk. http://www.slideshare.net/davidcarasso/datamining5
Cohen, P., Big Mechanism (DARPA Big Mechanism Program). http://www.darpa.mil/program/big-mechanism
Data Mining Using SAS Enterprise Miner. A Case Study Approach. http://support.sas.com/documentation/cdl/en/emcs/66392/PDF/default/emcs.pdf
SAS/STAT 14.1. User’s Guide. High-Performance Procedures. http://support.sas.com/documentation/cdl/en/stathpug/68163/PDF/default/stathpug.pdf
Pearl, J., Causality: Models, Reasoning, and Inference, Cambridge: Cambridge University Press, 2000.
Agrawal, R., Imielinski, T., and Swami, A., Mining association rules between sets of items in large databases, Proc. 1993 ACM SIGMOD International Conference on Management of Data (SIGMOD'93), New York, 1993, pp. 207–216.
Agrawal, R. and Srikant, R., Fast algorithms for mining association rules, Proc. 20th Int. Conf. Very Large Data Bases (VLDB), Morgan Kaufmann, 1994, pp. 487–499.
Tkach, D., Text Mining Technology: Turning Information into Knowledge, IBM White Paper, 1998. http://www.math.unipd.it/~dulli/corso04/whiteweb.pdf
Plotkin, G.D., A note on inductive generalization, Mach. Intell., 1970, no. 5, pp. 153–164.
Plotkin, G.D., A further note on inductive generalization, Mach. Intell., 1971, no. 6, pp. 101–124.
Kazemian, P., Chang, M., Zeng, H., Varghese, G., McKeown, N., and Whyte, S., Real time network policy checking using header space analysis, Proc. 10th USENIX Symposium on Networked Systems Design and Implementation,, Chicago, IL, 2013, pp. 99–111. www.usenix.org/system/files/conference/nsdi13/nsdi13final8.pdf
Kazemian, P., Varghese, G., and McKeown, N., Header space analysis: Static checking for networks, Proc. 9th USENIX Symposium on Networked Systems Design and Implementation, San Jose, CA, 2012, pp. 49–54. http://yuba.stanford.edu/~peyman/docs/headerspace-nsdi12.pdf
Snort. http://www.snort.org
Database of signatures of system Snort. http://www.snort.org/snortrules/
Galatenko, A.V., Automaton models of protected computer systems, Intell. Sist., vol. 11, no. 1–4, pp. 403–418.
Aleksandrov, D.E., Effective methods for checking the content of network packets by regular expressions, Intell. Sist., 2014, vol. 18, no. 1, pp. 37–60.
Zhuravlev, Yu.I., Correct algebras on sets of incorrect (heuristic) algorithms, Kibernetika, Part I, 1977, no. 4, pp. 5–17; Part II, 1977, no. 6, pp. 21–27; Part III, 1978, no. 2, pp. 35–43.
Zhuravlev, Yu.I., Ryazanov, V.V., and Sen’ko, O.V., “Raspoznavanie”. Matematicheskie metody. Programmnaya sistema. Prakticheskie primeneniya (“Recognition.” Mathematical Methods. Software System. Practical Applications), Moscow: Fazis, 2006.
Rudakov, K.V., Some universal restrictions for classification algorithms, Zh. Vychisl. Mat. Mat. Fiz., 1986, vol. 26, no. 11, pp. 1719–1730.
Avtomaticheskoe porozhdenie gipotez v intellektual’nykh sistemakh (Automatic Generation of Hypotheses in Intelligent Systems), Finn, V.K., Ed., Moscow: Librokom, 2009.
Finn, V.K., J.S. Mill’s inductive methods in artificial intelligence systems, Sci. Tech. Inf. Process., Part I, 2011, vol. 38, no. 6, pp. 385–402; Part II, 2012, vol. 39, no. 5, pp. 241–260.
Zabezhailo, M.I., Some capabilities of enumeration control in the DSM method, Sci. Tech. Inf. Process., Part I, 2014, vol. 41, no. 6, pp. 335–347; Part II, 2014, vol. 41, no. 6, pp. 348–361.
Base SAS. High-Performance Procedures. http://support.sas.com/documentation/cdl/en/prochp/68141/PDF/default/prochp.pdf
IBM Cloud Services. http://www-935.ibm.com/services/us/en/it-services/cloud-services/
GENI: Exploring Networks of the Future. http://www.geni.net
HP TippingPoint. http://www8.hp.com/ru/ru/softwaresolutions/network-security/index.html
Cisco Cloud Security White Papers. http://www.cisco.com/c/en/us/products/security/cloudweb-security/white-paper-listing.html
Intel DPDK: Data Plane Development Kit. http://dpdk.org/
ADI QuickStart SDN Development Kit (SDK). http://www.sdxcentral.com/products/adi-engineeringgigabit-sdn-quickstart-development-kit/
Intel launches SDN platform Seacliff Trail. http://servernews.ru/tags/sdn-платформа
Author information
Authors and Affiliations
Corresponding authors
Additional information
Original Russian Text © A.A. Grusho, M.I. Zabezhailo, A.A. Zatsarinnyi, V.O. Piskovskii, S.V. Borokhov, 2015, published in Nauchno-Tekhnicheskaya Informatsiya, Seriya 2, 2015, No. 11, pp. 1–11.
About this article
Cite this article
Grusho, A.A., Zabezhailo, M.I., Zatsarinnyi, A.A. et al. On the potential applications of data mining for information security provision of cloud-based environments. Autom. Doc. Math. Linguist. 49, 193–201 (2015). https://doi.org/10.3103/S0005105515060023
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0005105515060023