Book contents
- Data Analytics for Cybersecurity
- Data Analytics for Cybersecurity
- Copyright page
- Contents
- Preface
- Acknowledgments
- 1 Introduction
- 2 Understanding Sources of Cybersecurity Data
- 3 Introduction to Data Mining
- 4 Big Data Analytics and Its Need for Cybersecurity
- 5 Types of Cyberattacks
- 6 Anomaly Detection for Cybersecurity
- 7 Anomaly Detection Methods
- 8 Cybersecurity through Time Series and Spatial Data
- 9 Cybersecurity through Network and Graph Data
- 10 Human-Centered Data Analytics for Cybersecurity
- 11 Future Directions in Data Analytics for Cybersecurity
- References
- Index
3 - Introduction to Data Mining
Clustering, Classification, and Association Rule Mining
Published online by Cambridge University Press: 10 August 2022
- Data Analytics for Cybersecurity
- Data Analytics for Cybersecurity
- Copyright page
- Contents
- Preface
- Acknowledgments
- 1 Introduction
- 2 Understanding Sources of Cybersecurity Data
- 3 Introduction to Data Mining
- 4 Big Data Analytics and Its Need for Cybersecurity
- 5 Types of Cyberattacks
- 6 Anomaly Detection for Cybersecurity
- 7 Anomaly Detection Methods
- 8 Cybersecurity through Time Series and Spatial Data
- 9 Cybersecurity through Network and Graph Data
- 10 Human-Centered Data Analytics for Cybersecurity
- 11 Future Directions in Data Analytics for Cybersecurity
- References
- Index
Summary
This chapter gets into the techniques of data analytics, focusing on the three pillars of data mining, namely clustering, classification, and association rule mining, and how each can be used for cybersecurity. This chapter can be seen as a crash course in data mining. It begins with an understanding of the overall knowledge discovery and data mining process models and follows the elements of the data life cycle. This chapter outlines foundational elements such as measures of similarity and measures of evaluation. It outlines the landscape of various algorithms in clustering, classification, and frequent and rare patterns.
Keywords
- Type
- Chapter
- Information
- Data Analytics for Cybersecurity , pp. 29 - 59Publisher: Cambridge University PressPrint publication year: 2022