• Title/Summary/Keyword: Network Mining

Search Result 1,036, Processing Time 0.025 seconds

The network model for Detection Systems based on data mining and the false errors

  • Lee Se-Yul;Kim Yong-Soo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.6 no.2
    • /
    • pp.173-177
    • /
    • 2006
  • This paper investigates the asymmetric costs of false errors to enhance the detection systems performance. The proposed method utilizes the network model to consider the cost ratio of false errors. By comparing false positive errors with false negative errors this scheme achieved better performance on the view point of both security and system performance objectives. The results of our empirical experiment show that the network model provides high accuracy in detection. In addition, the simulation results show that effectiveness of probe detection is enhanced by considering the costs of false errors.

De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining

  • Su, Xin;Liu, Xuchong;Lin, Jiuchuang;He, Shiming;Fu, Zhangjie;Li, Wenjia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3230-3253
    • /
    • 2017
  • Android malware steals users' private information, and embedded unsafe advertisement (ad) libraries, which execute unsafe code causing damage to users. The majority of such traffic is HTTP and is mixed with other normal traffic, which makes the detection of malware and unsafe ad libraries a challenging problem. To address this problem, this work describes a novel HTTP traffic flow mining approach to detect and categorize Android malware and unsafe ad library. This work designed AndroCollector, which can automatically execute the Android application (app) and collect the network traffic traces. From these traces, this work extracts HTTP traffic features along three important dimensions: quantitative, timing, and semantic and use these features for characterizing malware and unsafe ad libraries. Based on these HTTP traffic features, this work describes a supervised classification scheme for detecting malware and unsafe ad libraries. In addition, to help network operators, this work describes a fine-grained categorization method by generating fingerprints from HTTP request methods for each malware family and unsafe ad libraries. This work evaluated the scheme using HTTP traffic traces collected from 10778 Android apps. The experimental results show that the scheme can detect malware with 97% accuracy and unsafe ad libraries with 95% accuracy when tested on the popular third-party Android markets.

Decision Tree Techniques with Feature Reduction for Network Anomaly Detection (네트워크 비정상 탐지를 위한 속성 축소를 반영한 의사결정나무 기술)

  • Kang, Koohong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.795-805
    • /
    • 2019
  • Recently, there is a growing interest in network anomaly detection technology to tackle unknown attacks. For this purpose, diverse studies using data mining, machine learning, and deep learning have been applied to detect network anomalies. In this paper, we evaluate the decision tree to see its feasibility for network anomaly detection on NSL-KDD data set, which is one of the most popular data mining techniques for classification. In order to handle the over-fitting problem of decision tree, we select 13 features from the original 41 features of the data set using chi-square test, and then model the decision tree using TensorFlow and Scik-Learn, yielding 84% and 70% of binary classification accuracies on the KDDTest+ and KDDTest-21 of NSL-KDD test data set. This result shows 3% and 6% improvements compared to the previous 81% and 64% of binary classification accuracies by decision tree technologies, respectively.

A Critical Analysis of Learning Technologies and Informal Learning in Online Social Networks Using Learning Analytics

  • Audu Kafwa Dodo;Ezekiel Uzor OKike
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.71-84
    • /
    • 2024
  • This paper presents a critical analysis of the current application of big data in higher education and how Learning Analytics (LA), and Educational Data Mining (EDM) are helping to shape learning in higher education institutions that have applied the concepts successfully. An extensive literature review of Learning Analytics, Educational Data Mining, Learning Management Systems, Informal Learning and Online Social Networks are presented to understand their usage and trends in higher education pedagogy taking advantage of 21st century educational technologies and platforms. The roles of and benefits of these technologies in teaching and learning are critically examined. Imperatively, this study provides vital information for education stakeholders on the significance of establishing a teaching and learning agenda that takes advantage of today's educational relevant technologies to promote teaching and learning while also acknowledging the difficulties of 21st-century learning. Aside from the roles and benefits of these technologies, the review highlights major challenges and research needs apparent in the use and application of these technologies. It appears that there is lack of research understanding in the challenges and utilization of data effectively for learning analytics, despite the massive educational data generated by high institutions. Also due to the growing importance of LA, there appears to be a serious lack of academic research that explore the application and impact of LA in high institution, especially in the context of informal online social network learning. In addition, high institution managers seem not to understand the emerging trends of LA which could be useful in the running of higher education. Though LA is viewed as a complex and expensive technology that will culturally change the future of high institution, the question that comes to mind is whether the use of LA in relation to informal learning in online social network is really what is expected? A study to analyze and evaluate the elements that influence high usage of OSN is also needed in the African context. It is high time African Universities paid attention to the application and use of these technologies to create a simplified learning approach occasioned by the use of these technologies.

Performance analysis of volleyball games using the social network and text mining techniques (사회네트워크분석과 텍스트마이닝을 이용한 배구 경기력 분석)

  • Kang, Byounguk;Huh, Mankyu;Choi, Seungbae
    • Journal of the Korean Data and Information Science Society
    • /
    • v.26 no.3
    • /
    • pp.619-630
    • /
    • 2015
  • The purpose of this study is to provide basic information to develop a game strategy plan of a team in a future by identifying the patterns of attack and pass of national men's professional volleyball teams and extracting core key words related with volleyball game performance to evaluate game performance using 'social network analysis' and 'text mining'. As for the analysis result of 'social network analysis' with the whole data, group '0' (6 players) and group '1' (11 players) were partitioned. A point of view the degree centrality and betweenness centrality in 'social network analysis' results, we can know that the group '1' more active game performance than the group '0'. The significant result for two group (win and loss) obtained by 'text mining' according to two groups ('0' and '1') obtained by 'social network analysis' showed significant difference (p-value: 0.001). As for clustering of each network, group '0' had the tendency to score points through set player D and E. In group '1', the player K had the tendency to fail if he attack through 'dig'; players C and D have a good performance through 'set' play.

Fuzzy Domain Ontology-based Opinion Mining for Transportation Network Monitoring and City Features Map (교통망 관찰과 도시 특징지도를 위한 퍼지영역 온톨로지 기반 오피니언 마이닝)

  • Ali, Farman;Kwak, Daehan;Islam, SM Riazul;Kim, Kye Hyun;Kwak, Kyung Sup
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.15 no.1
    • /
    • pp.109-118
    • /
    • 2016
  • Traffic congestions are rapidly increasing in urban areas. In order to reduce these problems, it needs real-time data and intelligent techniques to quickly identify traffic activities with useful information. This paper proposes a Fuzzy Domain Ontology(FDO)-based opinion mining system to monitor the transportation network in real-time as well to make a city polarity map for travelers. The proposed system retrieves tweets and reviews related to transportation activities and a city. The feature opinions are extracted from these tweets and reviews and then used FDO to identify transportation and city features polarity. This FDO and intelligent prototype are developed using $Prot{\acute{e}}g{\acute{e}}$ OWL (Web Ontology Language) and JAVA, respectively. The experimental result shows satisfactory improvement in tweets and review's analyzing and opinion mining.

Design of Process Management System based on Data Mining and Artificial Modelling for the Etching Process (데이터 마이닝과 지능 모델링에 기반한 에칭공정의 공정관리시스템 설계)

  • Bae, Hyeon;Kim, Sung-shin;Woo, Kwang-Bang
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.4
    • /
    • pp.390-395
    • /
    • 2004
  • A semiconductor manufacturing process is the complicate and dynamic process, and consists of many sub-processes. An etching process is the most important process in the semiconductor fabrication. In this paper, the decision support system based upon data mining and knowledge discovery is an important factor to improve the productivity and yield. The proposed decision support system consists of a neural network model and an inference system based on fuzzy logic Firstly, the product results are predicted by the neural network model constructed by the product patterns that represent the quality of the etching process. And the product patters are classified by expert's knowledge. Finally, the product conditions are estimated by the fuzzy inference system using the rules extracted from the classified patterns. Prediction of product qualities can be linked to each input and process variables. We employ data mining and intelligent techniques to find the best condition of the etching process. The proposed decision support system is efficient and easy to be implemented for the process management based upon expert's knowledge.

A Study on the Keyword Extraction for ESG Controversies Through Association Rule Mining (연관규칙 분석을 통한 ESG 우려사안 키워드 도출에 관한 연구)

  • Ahn, Tae Wook;Lee, Hee Seung;Yi, June Suh
    • The Journal of Information Systems
    • /
    • v.30 no.1
    • /
    • pp.123-149
    • /
    • 2021
  • Purpose The purpose of this study is to define the anti-ESG activities of companies recognized by media by reflecting ESG recently attracted attention. This study extracts keywords for ESG controversies through association rule mining. Design/methodology/approach A research framework is designed to extract keywords for ESG controversies as follows: 1) From DeepSearch DB, we collect 23,837 articles on anti-ESG activities exposed to 130 media from 2013 to 2018 of 294 listed companies with ESG ratings 2) We set keywords related to environment, social, and governance, and delete or merge them with other keywords based on the support, confidence, and lift derived from association rule mining. 3) We illustrate the importance of keywords and the relevance between keywords through density, degree centrality, and closeness centrality on network analysis. Findings We identify a total of 26 keywords for ESG controversies. 'Gapjil' records the highest frequency, followed by 'corruption', 'bribery', and 'collusion'. Out of the 26 keywords, 16 are related to governance, 8 to social, and 2 to environment. The keywords ranked high are mostly related to the responsibility of shareholders within corporate governance. ESG controversies associated with social issues are often related to unfair trade. As a result of confidence analysis, the keywords related to social and governance are clustered and the probability of mutual occurrence between keywords is high within each group. In particular, in the case of "owner's arrest", it is caused by "bribery" and "misappropriation" with an 80% confidence level. The result of network analysis shows that 'corruption' is located in the center, which is the most likely to occur alone, and is highly related to 'breach of duty', 'embezzlement', and 'bribery'.

Comparative co-expression analysis of RNA-Seq transcriptome revealing key genes, miRNA and transcription factor in distinct metabolic pathways in diabetic nerve, eye, and kidney disease

  • Asmy, Veerankutty Subaida Shafna;Natarajan, Jeyakumar
    • Genomics & Informatics
    • /
    • v.20 no.3
    • /
    • pp.26.1-26.19
    • /
    • 2022
  • Diabetes and its related complications are associated with long term damage and failure of various organ systems. The microvascular complications of diabetes considered in this study are diabetic retinopathy, diabetic neuropathy, and diabetic nephropathy. The aim is to identify the weighted co-expressed and differentially expressed genes (DEGs), major pathways, and their miRNA, transcription factors (TFs) and drugs interacting in all the three conditions. The primary goal is to identify vital DEGs in all the three conditions. The overlapped five genes (AKT1, NFKB1, MAPK3, PDPK1, and TNF) from the DEGs and the co-expressed genes were defined as key genes, which differentially expressed in all the three cases. Then the protein-protein interaction network and gene set linkage analysis (GSLA) of key genes was performed. GSLA, gene ontology, and pathway enrichment analysis of the key genes elucidates nine major pathways in diabetes. Subsequently, we constructed the miRNA-gene and transcription factor-gene regulatory network of the five gene of interest in the nine major pathways were studied. hsa-mir-34a-5p, a major miRNA that interacted with all the five genes. RELA, FOXO3, PDX1, and SREBF1 were the TFs interacting with the major five gene of interest. Finally, drug-gene interaction network elucidates five potential drugs to treat the genes of interest. This research reveals biomarker genes, miRNA, TFs, and therapeutic drugs in the key signaling pathways, which may help us, understand the processes of all three secondary microvascular problems and aid in disease detection and management.

aCN-RB-tree: Constrained Network-Based Index for Spatio-Temporal Aggregation of Moving Object Trajectory

  • Lee, Dong-Wook;Baek, Sung-Ha;Bae, Hae-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.5
    • /
    • pp.527-547
    • /
    • 2009
  • Moving object management is widely used in traffic, logistic and data mining applications in ubiquitous environments. It is required to analyze spatio-temporal data and trajectories for moving object management. In this paper, we proposed a novel index structure for spatio-temporal aggregation of trajectory in a constrained network, named aCN-RB-tree. It manages aggregation values of trajectories using a constraint network-based index and it also supports direction of trajectory. An aCN-RB-tree consists of an aR-tree in its center and an extended B-tree. In this structure, an aR-tree is similar to a Min/Max R-tree, which stores the child nodes' max aggregation value in the parent node. Also, the proposed index structure is based on a constrained network structure such as a FNR-tree, so that it can decrease the dead space of index nodes. Each leaf node of an aR-tree has an extended B-tree which can store timestamp-based aggregation values. As it considers the direction of trajectory, the extended B-tree has a structure with direction. So this kind of aCN-RB-tree index can support efficient search for trajectory and traffic zone. The aCN-RB-tree can find a moving object trajectory in a given time interval efficiently. It can support traffic management systems and mining systems in ubiquitous environments.