GAZI UNIVERSITY INFORMATION PACKAGE - 2019 ACADEMIC YEAR

COURSE DESCRIPTION
APPLICATIONS of DATA MINING for INSTRUSION DETECTION/5151339
Course Title: APPLICATIONS of DATA MINING for INSTRUSION DETECTION
Credits 3 ECTS 7.5
Course Semester 1 Type of The Course Elective
COURSE INFORMATION
 -- (CATALOG CONTENT)
 -- (TEXTBOOK)
 -- (SUPPLEMENTARY TEXTBOOK)
 -- (PREREQUISITES AND CO-REQUISITES)
 -- LANGUAGE OF INSTRUCTION
  Turkish
 -- COURSE OBJECTIVES
 -- COURSE LEARNING OUTCOMES
Learning of essential components of applications of data mining for intrusion detection
Propose effective solutions to tackle the main problems and challenges when designing applications of data mining in intrusion detection for a given environment

 -- MODE OF DELIVERY
  The mode of delivery of this course is Face to face
 --WEEKLY SCHEDULE
1. Week  Introduction to data mining and security applications
2. Week  Data mining: Overview of concepts and methods
3. Week   Intrusion detection: Introduction to intrusion detection
4. Week  Attack detection: Taxonomy (Classification)
5. Week  Intrusion detection and data mining: Major methods
6. Week  Applications and tools for data mining algorithms
7. Week  Data preparation for data mining in intrusion detection
8. Week  Midterm, Data preparation for data mining in intrusion detection, midterm
9. Week  Clustering for anomaly detection
10. Week  Classification for the detection of abnormalities
11. Week  Assessment methods and performance analysis
12. Week  Intrusion prevention systems and data mining applications
13. Week  Other data mining applications in information security
14. Week  Other data mining applications and student presentations in information security
15. Week  Final Exam
16. Week  
 -- TEACHING and LEARNING METHODS
 -- ASSESSMENT CRITERIA
 
Quantity
Total Weighting (%)
 Midterm Exams
0
40
 Assignment
0
0
 Application
0
5
 Projects
0
15
 Practice
0
0
 Quiz
0
0
 Percent of In-term Studies  
60
 Percentage of Final Exam to Total Score  
40
 -- WORKLOAD
 Activity  Total Number of Weeks  Duration (weekly hour)  Total Period Work Load
 Weekly Theoretical Course Hours
14
3
42
 Weekly Tutorial Hours
0
 Reading Tasks
14
2
28
 Searching in Internet and Library
14
1
14
 Material Design and Implementation
0
 Report Preparing
14
1
14
 Preparing a Presentation
14
2
28
 Presentation
14
1
14
 Midterm Exam and Preperation for Midterm Exam
14
2
28
 Final Exam and Preperation for Final Exam
14
2
28
 Other (should be emphasized)
0
 TOTAL WORKLOAD: 
196
 TOTAL WORKLOAD / 25: 
7.84
 Course Credit (ECTS): 
7.5
 -- COURSE'S CONTRIBUTION TO PROGRAM
NO
PROGRAM LEARNING OUTCOMES
1
2
3
4
5
1Defines problems in information security engineering.X
2Grasps the theoretical knowledge about information security engineering.X
3Applies gained knowledge and develops new solutions in the field of information security engineering.X
4Follows the national and international literature on the scientific and technological developments in information security engineering.X
5Proposes solutions to information security engineering problems using scientific research methods in the light of quality and standards.X
6Knows and applies the methods necessary to collect and analyze data pertaining to information security engineering.X
7Grasps the interaction among various disciplines related to information security engineering.X
8Evaluates research results using scientific criteria, presents the results in the form of academic articles and reports.X
9Takes responsibility to solve new problems in information security engineering.X
10Performs all professional activities within the confines of the law and ethics.X
11Makes contributions to industry and society through scientific innovation, novel approaches or applications of known methods to new fields.X
12Improves information security awareness in society by sharing knowledge and experience.X
13Recognizes the necessity of lifelong learning and acts accordingly.X
 -- NAME OF LECTURER(S)
   (Esra Nergis YOLAÇAN)
 -- WEB SITE(S) OF LECTURER(S)
   ()
 -- EMAIL(S) OF LECTURER(S)
   (eng@gazi.edu.tr)