Uncovering Threats: Data Mining Techniques for Cyber Security

Authors

  • Abhishek Guru 1Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, AP, India.
  • Anumolu Vasista Gopal Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, AP, India.
  • Sai Spandana Bandarupalli Bandarupalli Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, AP, India.
  • Nanduri Siva Sankar Sankar Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, AP, India.
  • Kakani Rama Rao Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, AP, India.

Keywords:

Intrusion detection framework, Artificial intelligence, Data mining, Cyber security, Cyber resilience

Abstract

To monitor criminal activities such as theft, data alteration, and system interference on one or multiple computers, we create a framework for intrusion detection. Traditional Intrusion Detection Systems (IDS) often struggle to identify the dynamic and sophisticated nature of digital attacks. However, by employing effective techniques, including different forms of artificial intelligence, we can enhance detection rates, minimize false positives, and offer cost-effective solutions. In particular, data mining enables ongoing pattern examination, classification, aggregation, and real-time data processing. This research study presents a focused literature review on advanced intrusion detection methods utilizing data mining and artificial intelligence. We identify relevant publications based on citation frequency or emerging trends to deliver an analysis, synthesis, and concise summary of their contents. Additionally, we highlight the critical importance of data in the realms of data mining and artificial intelligence.

References

Rajasekaran, M., Thanabal, M. S., & Meenakshi, A. (2024). Association rule hiding using enhanced elephant herding optimization algorithm. Automatika, 65(1), 98–107. https://doi.org/10.1080/00051144.2023.2277998

Liu, S., You, S., Yin, H., Lin, Z., Liu, Y., Yao, W., & Sundaresh, L. (2020). Model-free data authentication for cyber security in power systems. IEEE transactions on smart grid, 11(5), 4565–4568. https://doi.org/10.1109/TSG.2020.2986704

Wu, Q., & Shao, Z. (2005). Network anomaly detection using time series analysis. http://dx.doi.org/10.1109/ICAS-ICNS.2005.69

Feldman, R., & Dagan, I. (1995). Knowledge discovery in textual databases (KDT). [presentation]. KDD (Vol. 95, pp. 112–117). https://cdn.aaai.org/KDD/1995/KDD95-012.pdf

Homayoun, S., Dehghantanha, A., Ahmadzadeh, M., Hashemi, S., & Khayami, R. (2020). Know Abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence. IEEE transactions on emerging topics in computing, 8(2), 341–351. https://doi.org/10.1109/TETC.2017.2756908

Iqbal, F., Fung, B. C. M., Debbabi, M., Batool, R., & Marrington, A. (2019). Wordnet-based criminal networks mining for cybercrime investigation. IEEE access, 7, 22740–22755. https://doi.org/10.3390/diagnostics14131344

De Boer, M. H. T., Bakker, B. J., Boertjes, E., Wilmer, M., Raaijmakers, S., & van der Kleij, R. (2019). Text mining in cybersecurity: exploring threats and opportunities. Multimodal technologies and interaction, 3(3). https://doi.org/10.3390/mti3030062

Ye, Y., Li, T., Adjeroh, D., & Iyengar, S. (2017). A Survey on malware detection using data mining techniques. ACM computing surveys, 50, 1–40. http://dx.doi.org/10.1145/3073559

Manoj, K. S., & Aithal, P. S. (2020). Data mining and machine learning techniques for cyber security intrusion detection. University Library of Munich, Germany. https://www.academia.edu/download/74487288/C5979029320.pdf

Kolhar, M., Kazi, R. N. A., Mohapatra, H., & Al Rajeh, A. M. (2024). AI-driven real-time classification of ECG signals for cardiac monitoring using I-Alexnet architecture. Diagnostics, 14(13). https://doi.org/10.3390/diagnostics14131344

Published

2025-06-26

How to Cite

Uncovering Threats: Data Mining Techniques for Cyber Security. (2025). Risk Assessment and Management Decisions, 2(2), 80-86. https://ramd.reapress.com/journal/article/view/52

Similar Articles

1-10 of 11

You may also start an advanced similarity search for this article.