Data Warehousing Data Mining Privacy

Slides:



Advertisements
Similar presentations
Web Mining.
Advertisements

Data Mining Sangeeta Devadiga CS 157B, Spring 2007.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Week 9 Data Mining System (Knowledge Data Discovery)
© Prentice Hall1 DATA MINING TECHNIQUES Introductory and Advanced Topics Eamonn Keogh (some slides adapted from) Margaret Dunham Dr. M.H.Dunham, Data Mining,
University of Minnesota
Data Mining By Archana Ketkar.
Data Mining and Data Warehousing – a connected view.
Data Mining – Intro.
Data Mining.
Business Intelligence
Computer Science Universiteit Maastricht Institute for Knowledge and Agent Technology Data mining and the knowledge discovery process Summer Course 2005.
OLAM and Data Mining: Concepts and Techniques. Introduction Data explosion problem: –Automated data collection tools and mature database technology lead.
Data Mining : Introduction Chapter 1. 2 Index 1. What is Data Mining? 2. Data Mining Functionalities 1. Characterization and Discrimination 2. MIning.
Basic Concepts of Datawarehousing An Overview Prasanth Gurram.
Dr. Awad Khalil Computer Science Department AUC
Data Mining Techniques
Data Mining. 2 Models Created by Data Mining Linear Equations Rules Clusters Graphs Tree Structures Recurrent Patterns.
1 Data Mining DT211 4 Refer to Connolly and Begg 4ed.
Kansas State University Department of Computing and Information Sciences CIS 830: Advanced Topics in Artificial Intelligence From Data Mining To Knowledge.
Data Mining Chun-Hung Chou
3 Objects (Views Synonyms Sequences) 4 PL/SQL blocks 5 Procedures Triggers 6 Enhanced SQL programming 7 SQL &.NET applications 8 OEM DB structure 9 DB.
Chapter 1 Introduction to Data Mining
INTRODUCTION TO DATA MINING MIS2502 Data Analytics.
Knowledge Discovery and Data Mining Evgueni Smirnov.
Introduction to Web Mining Spring What is data mining? Data mining is extraction of useful patterns from data sources, e.g., databases, texts, web,
Data Mining Chapter 1 Introduction -- Basic Data Mining Tasks -- Related Concepts -- Data Mining Techniques.
Knowledge Discovery and Data Mining Evgueni Smirnov.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Data MINING Data mining is the process of extracting previously unknown, valid and actionable information from large data and then using the information.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
Data Mining – Intro. Course Overview Spatial Databases Temporal and Spatio-Temporal Databases Multimedia Databases Data Mining.
Guest Lecture Introduction to Data Mining Dr. Bhavani Thuraisingham September 17, 2010.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
CRM - Data mining Perspective. Predicting Who will Buy Here are five primary issues that organizations need to address to satisfy demanding consumers:
Chapter 5: Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization DECISION SUPPORT SYSTEMS AND BUSINESS.
Kansas State University Department of Computing and Information Sciences CIS 730: Introduction to Artificial Intelligence Friday, 14 November 2003 William.
1 Introduction to Data Mining C hapter 1. 2 Chapter 1 Outline Chapter 1 Outline – Background –Information is Power –Knowledge is Power –Data Mining.
MIS2502: Data Analytics Advanced Analytics - Introduction.
Data Mining and Decision Support
WHAT IS DATA MINING?  The process of automatically extracting useful information from large amounts of data.  Uses traditional data analysis techniques.
Data Warehousing Data Mining Privacy. Reading FarkasCSCE Spring
Big Data Analytics Are we at risk? Dr. Csilla Farkas Director Center for Information Assurance Engineering (CIAE) Department of Computer Science and Engineering.
1 Data Warehousing Data Warehousing. 2 Objectives Definition of terms Definition of terms Reasons for information gap between information needs and availability.
Data Mining – Introduction (contd…) Compiled By: Umair Yaqub Lecturer Govt. Murray College Sialkot.
CS570: Data Mining Spring 2010, TT 1 – 2:15pm Li Xiong.
MIS2502: Data Analytics Clustering and Segmentation Jeremy Shafer
DATA MINING and VISUALIZATION Instructor: Dr. Matthew Iklé, Adams State University Remote Instructor: Dr. Hong Liu, Embry-Riddle Aeronautical University.
The KDD Process for Extracting Useful Knowledge from Volumes of Data Fayyad, Piatetsky-Shapiro, and Smyth Ian Kim SWHIG Seminar.
Profiling: What is it? Notes and reflections on profiling and how it could be used in process mining.
Data Mining – Intro.
SNS COLLEGE OF TECHNOLOGY
MIS2502: Data Analytics Advanced Analytics - Introduction
DATA MINING © Prentice Hall.
Introduction C.Eng 714 Spring 2010.
Data and Applications Security Introduction to Data Mining
Datamining : Refers to extracting or mining knowledge from large amounts of data Applications : Market Analysis Fraud Detection Customer Retention Production.
Data Warehouse.
Knowledge Management Systems
Sangeeta Devadiga CS 157B, Spring 2007
Data Warehousing and Data Mining
Smart Portal To Protect Child Online
I don’t need a title slide for a lecture
Data Mining: Concepts and Techniques
Data Mining: Concepts and Techniques
Data Mining: Introduction
Data Mining: Concepts and Techniques
Kenneth C. Laudon & Jane P. Laudon
CSE591: Data Mining by H. Liu
Presentation transcript:

Data Warehousing Data Mining Privacy

Data Warehousing Repository of data providing organized and cleaned enterprise-wide data (obtained form a variety of sources) in a standardized format Data mart (single subject area) Enterprise data warehouse (integrated data marts) Metadata Farkas CSCE 824

Data Mining DM: search for for correlations, sequences, and trends Prediction Tasks Use some variables to predict unknown or future values of other variables Description Tasks Find human-interpretable patterns that describe the data Farkas CSCE 824

Knowledge Discovery in Databases: Process Interpretation/ Evaluation Knowledge Data Mining Patterns Preprocessing Preprocessed Data Selection Target Data Mine for: Selection Aggregation Abstraction Visualization Transformation/Conversion Statistical Analysis “Cleaning” Data adapted from: U. Fayyad, et al. (1995), “From Knowledge Discovery to Data Mining: An Overview,” Advanced in Knowledge Discovery and Data Mining, U. Fayyad et al. (Eds.), AAAI/MIT Press Farkas CSCE 824

Data Mining Technologies Clustering: find groups of similar data items Classification: separate data items into predefined groups Association rule mining: find dependencies in data Sequential associations: identify event sequences that are likely Detect Deviations: find outliers Farkas CSCE 824

DM Issues: Integrity Poor quality data: inaccurate, incomplete, missing meta-data Loss of traditional consistency, e.g., keys Source data quality vs. derived data quality Trust in the result of analysis? Farkas CSCE 824

Big Data Security and Privacy Large amount of data being considered Probabilistic inference Existing inference prevention: guaranteed truth Privacy-preserving analytics Farkas CSCE 824

Big Data Integrity Data-poisoning Data Accuracy Source provenance End-point filtering and validation Data-poisoning Farkas CSCE 824

Inference Problem DM: discover “new knowledge”  how to evaluate security risks? Example security risks: Prediction of sensitive information Misuse of information Assurance of “discovery” Farkas CSCE 824

Privacy and Sensitivity Large volume of private (personal) data Need: Proper acquisition, maintenance, usage, and retention policy Integrity verification Control of analysis methods (aggregation may reveal sensitive data) Farkas CSCE 824

Privacy What is the difference between confidentiality and privacy? Identity, location, activity, etc. Anonymity vs. accountability Farkas CSCE 824

Social Network Analysis The mapping and measuring of relationships and flows between people, groups, organizations, computers or other information processing entities Behavioral Profiling Note: Social Network Signatures User names may change, family and friends are more difficult to change Farkas CSCE 824

DM for Security Large-scale data analytics Fraud detection Intrusion detection Insiders misuse detection Fraud detection User/group/web site profiling Farkas CSCE 824

Next Class Continue on cloud and DM Farkas CSCE 824