Integrated Data Mining Approach for Security Alert System
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 4
Abstract
The need for automatic detection of deceptive Emails is increasing due to the rapid usage of Email communication in the Internet world. The proposed “Security Alert System” provides a way to identify the future terrorist events and criminal activities. It detects the suspicious Emails indicating future attacks by applying the integrated data mining technique called “Classification based on Predictive Association Rules (CPAR)”. CPAR generates a smaller set of high-quality predictive rules from which best k rules of each class are used to predict the class label of unknown class. This Security Alert System sends an alert Email message to the investigators that helps in analyzing mistrustful Emails and act in time. The CPAR approach achieves a good accuracy for detecting emails containing suspicious content than traditional classification methods. Our experiments show that the accuracy of CPAR is more than the simple associative classifier Apriori.
Authors and Affiliations
Saisudha Dorbala, Dr. Rakesh Nayak
Intuitionistic Fuzzy Sets: New Approach and Applications
This paper presents an extended definition of intuitionistic fuzzy set and some operations on intuitionistic fuzzy sets which will be very useful for solving the real life problems. In fact, the intuitionistic fuzzy...
Analysis of Four Stage Encryption
Four Stage Encryption generates the output alphabet from a given input alphabet. The size of the output alphabet depends upon the key K0. Unless this key is known, it is difficult to guess the size of the output alph...
Identifying Misuse of Data In Cloud
Cloud Storage Enables Users To Store Their Data Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protecti...
Vigorous Data Provision And Organization By Using Gossip Protocol
Cloud computing is focused on virtual mechanism data storage and sharing on web services. The cloud environment consists of several elements such as clients and distributions. It includes fault tolerance, high availa...
Perceiving TheMalevolent Sachet Fatalities
The open nature of the wireless medium leaves it vulnerable to intentional interferenceattacks, typically referred to as jamming. This intentional interference with wirelesstransmissions can be used as a launchpad for...