Shadows in the Cloud
Investigating Cyber Espionage
JOINT REPORT:
Information Warfare Monitor
Shadowserver Foudnation
April 6, 2010
WEB VERSION. Also found here: http://www.scribd.com/doc/29435784/SHADOWS-IN-THE-CLOUD-Investigating-Cyber-Espionage-2-0
On the Efficacy of Data Mining for Security Applications
Abstract
Data mining applications for security have been proposed, developed, used, and criticized frequently in the recent past. This paper examines several of the more common criticisms and analyzes some factors that bear on whether the criticisms are valid and/or can be overcome by appropriate design and use of the data mining application.