Professional Documents
Culture Documents
ISSN 2278-6856
Faculty of Computing & Information Science Ain Shams University, Abbassia, Cairo, EGYPTE
Faculty of Computing & Information Science Ain Shams University, Abbassia, Cairo, EGYPTE
Faculty of Computing & Information Science Ain Shams University, Abbassia, Cairo, EGYPTE
Faculty of Computing & Information Science Ain Shams University, Abbassia, Cairo, EGYPTE
Abstract
This paper introduces intelligence security strategy
approaches. The successful implementation of the egovernment depends on the viable security. E-government
security is considered one of the crucial factors for achieving
an advanced stage of e-government. In this research we
focused on several techniques, algorithms, approaches and
different areas of data mining technique models in Cyber
Security from different perspectives, to establish a
classification and comparison of various types of Intrusion
Detection and Countermeasures in E-government of this
researches, Intelligent Technique Approaches categorization
that reflect the important criteria of the data mining models.
It summarizes various Intelligent Data analyses and presents
an Intelligent Data Analysis of Cairo Cleaning and
Beautification Agency; establishing such a classification
impacts deeply guiding data mining applications towards
better operations and performance. Moreover how data
mining can help in detection and prevention of these attacks.
Information security violations such as access control
violations as well as a discussion of various threats are
presented. Finally we present a comparative analysis between
selected models to improve security.
1. INTRODUCTION
The field of Artificial Intelligence has found many
applications in the operation of power systems. These
applications range from Expert Systems to assist with
network fault diagnosis and rectification to Artificial
Neural Networks and Fuzzy Logic to provide models for
complex non-linear control problems.
Intrusion detection (ID) has become a critical Component
of network administration due to the vast number of
attacks persistently threaten our computers. Traditional
intrusion detection systems are limited and do not provide
a complete solution for the problem. Security is an
important issue for the future of the cyberspace; due to
access of malicious data in internet and in system security
that controls real time data and leads to huge dimensional
problems, so a data pre-processing is necessary. Attacks
against the computer infrastructures are becoming an
ISSN 2278-6856
ISSN 2278-6856
Page 8
ISSN 2278-6856
Page 9
ISSN 2278-6856
Page 10
ISSN 2278-6856
Page 11
ISSN 2278-6856
ISSN 2278-6856
3. Proposals
From above mentioned studies and according to the
several advantages of (DM approaches and "Penetration
testing") for E-government intrusion detection, we suggest
that a combination of both approaches can help in
developing a new generation of high performance IDS. In
comparison to traditional IDS (Fig.3), IDS based on DM
Page 13
ISSN 2278-6856
4. Evaluation
To improve the framework, we have to take into
consideration the previous challenges, many of these
challenges cannot be solved by technology alone, but they
require understanding the collective social dynamics as
roots of problems and key to their solutions.
The basic difference between the current study and the
previously mentioned studies can be summarized in that
the current study is applied on certain minor cyber in
Egypt, "Cairo Cleaning and Beautification Agency".
Another difference is represented in "penetration test
model" as a collective approach that gathered all strategies
(Frequencies, Association rules, decision trees, hybrid of
auto regression, Bayesian network and Neural Networks
Model). The previous studies used one of these strategies
but there is no study that used two strategies together.
This make the current study different in its methodology
for treating with security of data.
ISSN 2278-6856
5. Conclusions
This paper has been conducted a comparison between
different data mining frameworks as Penetration test for
classification purposes, it presented an overview of the
techniques that had been utilized for the detection of
attacks against computer systems, and a survey of the
experiences of those most affected by intrusion detection
technology.
This paper provides the review of literature on how data
mining techniques and related algorithms can play a vital
role in ensuring information security in an E-government.
We have also reviewed some of the significant techniques
which hold the promise of effectively protecting computer
systems. It is obvious that our national security apparatus
is driven by a reactive focus on the crime or terror
incidents. However, the crime incidents or terror attacks
are merely the end products of a complex set of criminal
or terror activities.
Also, it shows general vision for how to utilize intelligent
approaches for securing the data in E-government
information systems through measuring the extent of
securing the extraction of the required data on electronic
site, and becoming able to fight the cyber terrorism, as we
depended on using a set of models to measure the extent
of the correctness and security of the data.
The data mining of data security data (e.g., related to
police operations) could enable the discovery of systemic
inefficiency in connection to security response, crime
incidence analysis and prevention efforts. Data mining
could help provide explanation of crime and terror. The
data mining techniques however could mine the historical
data and extract hidden predictive information which
could prove the initial assumption that it will face
numerous problems.
However data mining can be a valuable tool in the hands
of the decision makers aiming to predict the internal and
external environment, adjust accordingly and hence to
make more rational decisions.
Also included are ways to achieve sustainability for this
critical E governance project and so safeguard our
national critical data from digital terror and fraud. This
paper initiates concepts relating to the establishment of an
effective framework for data management of digital
evidence. The current intelligent approach is very useful
technique for building strategies that measure the extent
of securing data in order to improve the management
performance, through the filtration of data. Also the
suggested technique could become an important tool for
the government and intelligence agencies in the decisionmaking and monitoring potential international terrorist
threats.
ISSN 2278-6856
REFERENCE
[1] S. Axelsson, Intrusion Detection Systems: A Survey
and Taxonomy. Technical Report 99-15, Chalmers
Univ.,March,http://citeseer.ist.psu.edu/viewdoc/summ
ary?doi=10.1.1.1.6603, 2000.
[2] Jiawei Han and. Micheline Kamber, Data Mining:
Concepts and Techniques, Morgan Kufmann,
2ndedition 2006, 3rd edition 2011.
[3] S.J. Stolfo, W. Lee. P. Chan, W. Fan and E. Eskin,
Data Mining based Intrusion Detector: An
overview of the Columbia IDS Project ACM
SIGMOD Records vol. 30, Issue 4, 2001.
[4] Fayyad and Uthurusamy,"Consumer subjectivity in
the Age of Internet: the radical concept of marketing
control through customer relationship management
Original Research Article" Information and
Organization, Volume 14, Issue 3, Pages 211-236,
July 2004.
[5] Fayyad, U., & Piatetsky, G.,& Smyth, P.,(1996). From
Data Mining to Knowledge Discovery in Databases,
AI Magazine, American Association for Artificial
Intelligence, Volume 17 Number 3 ( AAAI) All
rights reserved 0738-4602 (1996)
[6] Tam and Kiang, 1992; Chu & Widjaja, "Data Mining
Techniques and the Decision Making Process in the
Bulgarian Public Administration"1994.
[7] Six hours to hack the FBI (and other pen-testing
adventures),http://www.computerworld.com/action/a
rticle.do?command=viewArticleBasic&articleId=9
087441, -04-25, 2009.
[8] McRue, A. (2006). University opens school for
hackers. URL: http://news.cnet.com/Universityopens-schoolfor-hackers/2100-7355_3-6085375.html
,Accessed 8 August ,2010.
[9] Xiong, D., & Moustafa, M., & Ghanem, Yike, G ,
NSS, pp. 522-527, 2009. Rea-Time Data Mining
Methodology
and
a
Supporting
FrameworkConference : International Conference on
Network and System Security, 2009.
[10] Olivier, T., & Marc, D., (2008). Actionable
Knowledge Discovery for Threats Intelligence
Support using a Multi-Dimensional Data Mining
Page 16
ISSN 2278-6856
ISSN 2278-6856
ISSN 2278-6856
AUTHOR
Hanaa Mohamed Said is general
manger
OF
Information
&
Computer Center at Cairo Cleaning
&
Beautification
Authorized,
Egypt. Eng Hanaa Mohamed Said
is responsible for Supervision of all
administration tasks for five departments as follows: The
Center of information, Eng Hanaa Mohamed Said got
B.SC. in
communications Engineering, Faculty of
Engineering, Helwan University, Graduation 1987, Dept :
Telecommunications & Electronic, Project: Design of
Microprocessor, Eng Hanaa Mohamed Said got a diploma
of computer science from Ain Shams university with very
good , Eng Hanaa Mohamed Said got a Master degree of
Page 19
ISSN 2278-6856
Page 20