Introduction to The Data Mining Techniques in Cybersecurity

Main Article Content

Israa Ezzat Salem
Maad Mijwil
Alaa Wagih Abdulqader
Marwa M. Ismaeel
Anmar Alkhazraji
Anas M. Zein Alaabdin

Abstract

As a result of the evolution of the Internet and the massive amount of data that is transmitted every second, as well as the methods for protecting and preserving it and distinguishing those who are authorized to view it, the role of cyber security has evolved to provide the best protection for information over the network. In this paper, the researcher discusses the role of data mining methods in cyber security. Data mining has several uses in security, including national security (for example, surveillance) and cyber security (e.g., virus detection). Attacks against buildings and the destruction of key infrastructure, such as power grids and telecommunications networks, are examples of national security concerns. Cybersecurity is concerned with safeguarding computer and network systems from harmful malware such as Trojan horses and viruses. In addition, data mining is being used to deliver solutions such as intrusion detection and auditing.

Article Details

Section

Articles

How to Cite

Introduction to The Data Mining Techniques in Cybersecurity (Israa Ezzat Salem, M. Mijwil, Alaa Wagih Abdulqader, Marwa M. Ismaeel, Anmar Alkhazraji, & Anas M. Zein Alaabdin , Trans.). (2022). Mesopotamian Journal of CyberSecurity, 2022, 28-37. https://doi.org/10.58496/MJCS/2022/004

Similar Articles

You may also start an advanced similarity search for this article.