Have a personal or library account? Click to login
Application of Association Rule Mining in Preventing Cyberattacks Cover

References

  1. Agrawal R., Srikant R., Fast Algorithms for Mining Association Rules in Large Databases, In Proceedings of the 20th International Conference on Very Large Data Bases, VLDB ’94, Morgan Kaufmann Publishers Inc, San Francisco, CA, USA, 487-499.
  2. Barrett M., Framework for Improving Critical Infrastructure Cybersecurity Version 1.1, NIST Cybersecurity Framework, 2018 (available online, https://doi.org/10.6028/NIST.CSWP.04162018, last accessed: October 2021).
  3. Dasgupta D., Akhtar Z., Sen S., Machine Learning in Cybersecurity: A Comprehensive Survey, The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, 19, 1, 57-106 (2020).10.1177/1548512920951275
  4. Dean J., Ghemawat S., MapReduce: Simplified Data Processing on Large Clusters, Commun. Association for Computing Machinery, New York, NY, USA, 51, 1, 107-113 (2008).10.1145/1327452.1327492
  5. Fielding R.T., Reschke J., Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content, RFC 7231, ISSN: 2070-1721, June 2014.10.17487/rfc7231
  6. Han J., Kamber M., Pei J., Data Mining: Concepts and Techniques, ITPro Collection, Morgan Kaufmann Series in Data Management Systems, Morgan Kaufmann Publishers, 3rd Edition, 2012.
  7. Hutchins E., Cloppert M., Amin R., Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains, Proceedings of the 6th International Conference on I-Warfare and Security, Washington, DC, USA, 17–18 March 2011, 113-125.
  8. Jin Z., Cui Y., Yan Z., Survey of Intrusion Detection Methods Based on Data Mining Algorithms, In Proceedings of the 2019 International Conference on Big Data Engineering (BDE 2019). Association for Computing Machinery, New York, NY, USA, 98-106.10.1145/3341620.3341632
  9. Johannes U., Who Is Hunting for Your IPTV Set-Top Box?, SANS ISC InfoSec Forums, 2021 (available online: https://isc.sans.edu/forums/diary/Who+Is+Hunting+For+Your+IPTV+SetTop+Box/27912/, last accessed: October 2021)
  10. Jost R., WordPress Plugin Secure Copy Content Protection and Content Locking 2.8.1 - SQL-Injection (Unauthenticated) - CVE 2021-24931, Exploit Database, 2021 (available online: https://www.exploit-db.com/exploits/50733, last accessed: December 2021).
  11. Kabanda G., Performance of Machine Learning and other Artificial Intelligence Paradigms in Cybersecurity, Oriental Journal of Computer Science and Technology, 13, 1, 1–21 (2020).10.13005/ojcst13.01.01
  12. La Rocca M., Advanced Algorithms and Data Structures, Manning Publications, 173-217, 2021.
  13. Lee W., Stolfo S.J., Data-Mining Approaches for Intrusion Detection. In 7th USENIX Security Symposium, SSYM’98, USENIX Association, Berkeley, CA, USA, 1998, volume 7, 6–21.
  14. Lee W., Stolfo S.J., Mok K.W, Algorithms for Mining System Audit Data, In data-mining, Rough Sets and Granular Computing; Physica-Verlag GmbH: Heidelberg, Germany, 2002, 166-189 (2002).10.1007/978-3-7908-1791-1_8
  15. Lee W., Applying Data-Mining to Intrusion Detection: The Quest for Automation, Efficiency, and Credibility, SIGKDD Explor. 2002, 4, 35–42.10.1145/772862.772868
  16. Li N., Zeng L., He Q., Shi Z., Parallel Implementation of Apriori Algorithm Based on MapReduce, 2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 08-10 August 2012, Kyoto, Japan, 236–241.10.1109/SNPD.2012.31
  17. Mao W., Guo W., An Improved Association Rules Mining Algorithm Based on Power Set and Hadoop, 2013 International Conference on Information Science and Cloud Computing Companion, 07-08 December 2013, Guangzhou, China, 236-241.10.1109/ISCC-C.2013.39
  18. Mironeanu C., Archip A., Amarandei C.M., Craus M., Experimental Cyber Attack Detection Framework, Electronics, 10, 14:1682 (2021).10.3390/electronics10141682
  19. Mironeanu C., Prevenirea atacurilor cibernetice cu tehnici de data mining, Teza de doctorat, Universitatea Tehnică “Gheorghe Asachi” din Iaşi, 2021.
  20. Pols P., The Unified Kill Chain - Designing a Unified Kill Chain for Analyzing, Comparing and Defending Against Cyber Attacks, MSc. Degree Thesis, Delft University of Technology, 2017.
  21. Schneier B., The Process of Security, 2000 (available online: https://www.schneier.com/essays/archives/2000/04/the_process_of_secur.html, last accessed: October 2021).
  22. Sfakianakis A., Douligeris C., Marinos L., Lourenço M., Raghimi O., ENISA Threat Landscape Report 2018, Report O.1.2.1, European Union Agency for Network and Information Security, Heraklion, Greece, 47-53.
  23. Shustin R., We Decide What You See: Remote Code Execution on a Major IPTV Platform, Check Point Research, 2019 (available online: https://research.checkpoint.com/2019/we-decide-what-you-see-remote-code-execution-on-a-major-iptv-platform/, last accessed: October 2021).
  24. Widup S., Pinto A., Hylender C.D., Basset. G., Langlois P., Verizon Data Breach Investigations Report, Verizon USA, 2021 (available online: https://www.verizon.com/business/resources/reports/dbir/, last accessed: October 2021).10.1016/S1361-3723(21)00061-0
  25. *** Apache Hadoop, https://hadoop.apache.org/, last visit on October 2021.
DOI: https://doi.org/10.2478/bipie-2021-0020 | Journal eISSN: 2537-2726 | Journal ISSN: 1223-8139
Language: English
Page range: 25 - 41
Submitted on: Dec 11, 2021
|
Accepted on: Dec 29, 2021
|
Published on: Sep 22, 2022
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2022 Cătălin Mironeanu, Alexandru Archip, Georgiana Atomei, published by Gheorghe Asachi Technical University of Iasi
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.