Detecting misuse of information retrieval systems using data mining techniques

  • Authors:
  • Nazli Goharian;Ling Ma;Chris Meyers

  • Affiliations:
  • Information Retrieval Laboratory, Illinois Institute of Technology;Information Retrieval Laboratory, Illinois Institute of Technology;Information Retrieval Laboratory, Illinois Institute of Technology

  • Venue:
  • ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Misuse detection is often based on file permissions. That is, each authorized user can only access certain files. Predetermining the mapping of documents to allowable users, however, is highly difficult in large document collections. Initially, we utilized information retrieval techniques to warn of potential misuse. Here, we describe some data mining extensions used in our detection approach.