Have a personal or library account? Click to login
Data Mining Usage in Corporate Information Security: Intrusion Detection Applications Cover

Data Mining Usage in Corporate Information Security: Intrusion Detection Applications

Open Access
|May 2017

References

  1. 1. Baesens, B., Mues, C., Martens, D., Vanthienen, J. (2009), “50 years of data mining and OR: upcoming trends and challenges“, Journal of the Operational Research Society, Vol. 60, pp. S16-S23.
  2. 2. Bose, R. (2006), “Intelligent technologies for managing fraud and identity theft“, in Third International Conference on Information Technology: New Generations, (ITNG 2006), IEEE, pp. 446-451.10.1109/ITNG.2006.78
  3. 3. Chen, W. H., Hsu, S. H., Shen, H. P. (2005), “Application of SVM and ANN for intrusion detection“, Computors & Operations Research, Vol. 32 No. 10, pp. 2617-2634.10.1016/j.cor.2004.03.019
  4. 4. Chen, Y., Abraham, A., Yang, B. (2007), “Hybrid flexible neural‐tree‐based intrusion detection systems”, International Journal of Intelligent Systems, Vol. 22 No. 4, pp. 337-352.10.1002/int.20203
  5. 5. Dlamini, M. T., Eloff, J. H., Eloff, M. M. (2009), “Information security: The moving target“, Computers & Security, Vol. 28 No. 3-4, pp. 189-198.10.1016/j.cose.2008.11.007
  6. 6. Fienberg, S. E. (2006), “Privacy and confidentiality in an e-commerce world: Data mining, data warehousing, matching and disclosure limitation”, Statistical Science, Vol. 21 No. 2, pp. 143-154.10.1214/088342306000000240
  7. 7. Greene, S. S. (2006). Security Policies and Procedures, New Jersey, Pearson Education.
  8. 8. Herath, T., Rao, H. R. (2009), “Protection motivation and deterrence: a framework for security policy compliance in organisations“, European Journal of Information Systems, Vol. 18 No. 2, pp. 106-125.10.1057/ejis.2009.6
  9. 9. Ishiguro, M., Tanaka, H., Matsuura, K., Murase, I. (2006), “The effect of information security incidents on corporate values in the Japanese stock market”, in International Workshop on the Economics of Securing the Information Infrastructure (WESII).
  10. 10. Kim, J., Bentley, P. J., Aickelin, U., Greensmith, J., Tedesco, G., Twycross, J. (2007), “Immune system approaches to intrusion detection - a review”, Natural computing, Vol. 6 No. 4, pp. 413-466.10.1007/s11047-006-9026-4
  11. 11. Kim, Y., Chang, H. (2014), “The industrial security management model for SMBs in smart work”, Journal of Intelligent Manufacturing, Vol. 25 No. 2, pp. 319-327.10.1007/s10845-012-0651-8
  12. 12. Matatov, N., Rokach, L., Maimon, O. (2010), “Privacy-preserving data mining: A feature set partitioning approach”, Information Sciences, Vol. 180 No. 14, pp. 2696-2720.10.1016/j.ins.2010.03.011
  13. 13. Mlitwa, N. B. W., Birch, D. (2011), “The role of intrusion detection systems in electronic information security: From the activity theory perspective”, Journal of Engineering, Design and Technology, Vol. 9 No. 3, pp. 296-312.10.1108/17260531111179915
  14. 14. Mohammad, M. N., Sulaiman, N., Abdulkarim Muhsin, O. (2011), “A Novel Intrusion Detection System by using Intelligent Data Mining in Weka Environment“, Procedia Computer Science, Vol. 3 No. 5, pp. 1237-1242.10.1016/j.procs.2010.12.198
  15. 15. Pejic-Bach, M. (2010), “Profiling Intelligent Systems Applications in Fraud Detection and Prevention: Survey of Research Articles“, 2010 International Conference on Intelligent Systems, Modelling and Simulation (ISMS), IEEE, pp. 80-85.10.1109/ISMS.2010.26
  16. 16. Sayed, M., Jradi, F. (2014), “Biometrics: Effectiveness and Applications within the Blended Learning Environment”, Computer Engineering and Intelligent Systems, Vol. 5 No. 5, pp. 1-8.
  17. 17. Stoel, M. D., Muhanna, W. A. (2011), “IT internal control weaknesses and firm performance: An organizational liability lens“, International Journal of Accounting Information Systems, Vol. 12 No. 4, pp. 280-304.10.1016/j.accinf.2011.06.001
  18. 18. Thamaraiselvi, G., Kaliammal, A. (2004), “Data mining: concepts and techniques”, SRELS Journal of Information Management, Vol. 41 No. 4, pp. 339-348.
  19. 19. Theoharidou, M., Kokolakis, S., Karyda, M., Kiountouzis, E. (2005), “The insider threat to information systems and the effectiveness of ISO17799“, Computers & Security, Vol. 24 No. 6, pp. 472-484.10.1016/j.cose.2005.05.002
  20. 20. Toval, A., Nicolás, J., Moros, B., García, F. (2002), “Requirements reuse for improving information systems security: a practitioner’s approach”, Requirements Engineering, Vol. 6 No. 4, pp. 205-219.10.1007/PL00010360
  21. 21. Trompeter, C. M., Eloff, J. H. P. (2001), “A framework for the implementation of socio-ethical controls in information security”, Computers & Security, Vol. 20 No. 5, pp. 384-391.10.1016/S0167-4048(01)00507-7
  22. 22. Viega, J. (2009), “Cloud computing and the common man“, Computer, Vol. 42 No. 8, pp. 106-108.10.1109/MC.2009.252
  23. 23. Vigna, G., Kemmerer, R. A. (1999), “NetSTAT: A network-based intrusion detection system”, Journal of computer security, Vol. 7 No. 1, pp. 37-71.10.3233/JCS-1999-7103
  24. 24. Von Solms, B., Von Solms, R. (2004), “The 10 deadly sins of information security management”, Computers & Security, Vol. 23 No. 5, pp. 371-376.10.1016/j.cose.2004.05.002
  25. 25. Whitman, M. E., Mattord, H. J. (2010). Principles of information security, Cengage Learning.
  26. 26. Willison, R. (2006), “Understanding the perpetration of employee computer crime in the organisational context“, Information and organization, Vol. 16 No. 4, pp. 304-324.10.1016/j.infoandorg.2006.08.001
  27. 27. Workman, M. (2007), “Gaining access with social engineering: An empirical study of the threat“, Information Systems Security, Vol. 16 No. 6, pp. 315-331.10.1080/10658980701788165
  28. 28. Yeh, Q. J., Chang, A. J. T. (2007), “Threats and countermeasures for information system security: A cross-industry study“, Information & Management, Vol. 44 No. 5, pp. 480-491.10.1016/j.im.2007.05.003
  29. 29. Yen, E. C. (2007), “Warning signals for potential accounting frauds in blue chip companies - An application of adaptive resonance theory“, Information Sciences, Vol. 177 No. 20, pp. 4515-4525.10.1016/j.ins.2007.03.034
  30. 30. Yu, Z., Tsai, J. J. P. (2007), “An Automatically Tuning Intrusion Detection System“, IEEE Transactions on Systems, Man, and Cybernetics - Part B: Cybernetics, Vol. 37 No. 2, pp. 373-384.10.1109/TSMCB.2006.885306
  31. 31. Zhu, D., Premkumar, G., Zhang, X., Chu, C-H. (2001), “Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods“, Decision Sciences, Vol. 32 No. 4, pp. 635-660.10.1111/j.1540-5915.2001.tb00975.x
DOI: https://doi.org/10.1515/bsrj-2017-0005 | Journal eISSN: 1847-9375 | Journal ISSN: 1847-8344
Language: English
Page range: 51 - 59
Submitted on: Jul 7, 2016
|
Accepted on: Nov 18, 2016
|
Published on: May 18, 2017
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2017 Masoud Al Quhtani, published by IRENET - Society for Advancing Innovation and Research in Economy
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.