Integrated Data Mining Approach for Security Alert System

Abstract

The need for automatic detection of deceptive Emails is increasing due to the rapid usage of Email communication in the Internet world. The proposed “Security Alert System” provides a way to identify the future terrorist events and criminal activities. It detects the suspicious Emails indicating future attacks by applying the integrated data mining technique called “Classification based on Predictive Association Rules (CPAR)”. CPAR generates a smaller set of high-quality predictive rules from which best k rules of each class are used to predict the class label of unknown class. This Security Alert System sends an alert Email message to the investigators that helps in analyzing mistrustful Emails and act in time. The CPAR approach achieves a good accuracy for detecting emails containing suspicious content than traditional classification methods. Our experiments show that the accuracy of CPAR is more than the simple associative classifier Apriori.

Authors and Affiliations

Saisudha Dorbala, Dr. Rakesh Nayak

Keywords

Related Articles

Intuitionistic Fuzzy Sets: New Approach and Applications

This paper presents an extended definition of intuitionistic fuzzy set and some operations on intuitionistic fuzzy sets which will be very useful for solving the real life problems. In fact, the intuitionistic fuzzy...

Analysis of Four Stage Encryption

Four Stage Encryption generates the output alphabet from a given input alphabet. The size of the output alphabet depends upon the key K0. Unless this key is known, it is difficult to guess the size of the output alph...

Identifying Misuse of Data In Cloud

Cloud Storage Enables Users To Store Their Data Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protecti...

Vigorous Data Provision And Organization By Using Gossip Protocol

Cloud computing is focused on virtual mechanism data storage and sharing on web services. The cloud environment consists of several elements such as clients and distributions. It includes fault tolerance, high availa...

Perceiving TheMalevolent Sachet Fatalities

The open nature of the wireless medium leaves it vulnerable to intentional interferenceattacks, typically referred to as jamming. This intentional interference with wirelesstransmissions can be used as a launchpad for...

Download PDF file
  • EP ID EP27901
  • DOI -
  • Views 233
  • Downloads 0

How To Cite

Saisudha Dorbala, Dr. Rakesh Nayak (2014). Integrated Data Mining Approach for Security Alert System. International Journal of Research in Computer and Communication Technology, 3(4), -. https://europub.co.uk/articles/-A-27901