Introduction to The Data Mining Techniques in Cybersecurity

Main Article Content

Israa Ezzat Salem
Maad Mijwil
Alaa Wagih Abdulqader
Marwa M. Ismaeel
Anmar Alkhazraji
Anas M. Zein Alaabdin

Abstract

As a result of the evolution of the Internet and the massive amount of data that is transmitted every second, as well as the methods for protecting and preserving it and distinguishing those who are authorized to view it, the role of cyber security has evolved to provide the best protection for information over the network. In this paper, the researcher discusses the role of data mining methods in cyber security. Data mining has several uses in security, including national security (for example, surveillance) and cyber security (e.g., virus detection). Attacks against buildings and the destruction of key infrastructure, such as power grids and telecommunications networks, are examples of national security concerns. Cybersecurity is concerned with safeguarding computer and network systems from harmful malware such as Trojan horses and viruses. In addition, data mining is being used to deliver solutions such as intrusion detection and auditing.

Downloads

Download data is not yet available.

Article Details

How to Cite
Israa Ezzat Salem, Mijwil, M., Alaa Wagih Abdulqader, Marwa M. Ismaeel, Anmar Alkhazraji, & Anas M. Zein Alaabdin. (2022). Introduction to The Data Mining Techniques in Cybersecurity . Mesopotamian Journal of CyberSecurity, 2022, 28–37. https://doi.org/10.58496/MJCS/2022/004
Section
Articles