CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Missing Values Prediction for Cyber Vulnerability Analysis in Academic Institutions

by Bhavya Agrawal, Anurag Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 43
Year of Publication: 2018
Authors: Bhavya Agrawal, Anurag Jain
10.5120/ijca2018917129

Bhavya Agrawal, Anurag Jain . Missing Values Prediction for Cyber Vulnerability Analysis in Academic Institutions. International Journal of Computer Applications. 180, 43 ( May 2018), 16-25. DOI=10.5120/ijca2018917129

@article{ 10.5120/ijca2018917129,
author = { Bhavya Agrawal, Anurag Jain },
title = { Missing Values Prediction for Cyber Vulnerability Analysis in Academic Institutions },
journal = { International Journal of Computer Applications },
issue_date = { May 2018 },
volume = { 180 },
number = { 43 },
month = { May },
year = { 2018 },
issn = { 0975-8887 },
pages = { 16-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume180/number43/29419-2018917129/ },
doi = { 10.5120/ijca2018917129 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:03:29.570299+05:30
%A Bhavya Agrawal
%A Anurag Jain
%T Missing Values Prediction for Cyber Vulnerability Analysis in Academic Institutions
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 43
%P 16-25
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, a survey-based study has been done to analyze the cyber security vulnerability of higher education institutions to identify the areas that are more prone to cyber threats at different user levels (System Administrator and Students & Faculty). One of the major elements of data mining- prediction of Missing Values has been amalgamated with vulnerability analysis of academic institutes to improve their practices and compliance of information security. These predictions help in identifying associations and handling missing data due to lack of awareness among users for more effective vulnerability analysis of the cyber security in academic environments. Subsequently, it will lead to formation of essential security guidelines that institutes can adopt to avoid above mentioned risks. Two theories have been proposed to identify the cyber vulnerabilities based on Questionnaire filled by different user levels. Prediction of missing values has also been evaluated after pre-processing and tried to filled the blank entities in the Questionnaire. The result shows that, after the prediction of missing values there is still significant number of students and faculty who are confused about the HR Policies of their institutes making their information security vulnerable. Hence guidelines to mitigate vulnerability issues have been proposed in this research work.

References
  1. “Why Information Security in Education?” [Online]. Available:https://nces.ed.gov/pubs98/safetech/chapter1.asp
  2. “Criminals target school data: top 10 security measuresfor educational institutions” [Online]. Available:
  3. https://www.welivesecurity.com/2014/07/03/schools-and-cybercrime-data-security-in-education/
  4. “Cybersecurity Challenges Facing Higher Education” [Online].Available:http://www.centerdigitaled.com/higher-ed/8-Cybersecurity-Challenges-Facing-Higher-Education.html/
  5. “PM Modi asks top police officials to deal with cybercrimeon priority”[Online].Available: http://indianexpress.com/article/india/pm-narendra-modi-asks-top-police-officials-to-deal-with-cyber-crime-on-priority-5016598/
  6. F. H. Katz (2005), ‘The effect of a university information security survey on instruction methods in information security,’ in Proceedings of the 2nd Annual Conference on Information Security Curriculum Development, pp. 43-48.
  7. Bhilare D.S. (2013), ‘Information security preparedness of Indian Academic Campuses with respect to global standards: a Gap Analysis’, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Vol 2, No.11, pp. 57-67.
  8. Burney, S.M. A. (2010), ‘Network Usage Policies for Academic Institutions’, International Journal of Computer Applications, Vol. 7, No. 14, pp. 6-11.
  9. Helwig M. H. (2005), ‘Global Information Assurance Certification Paper’, SANS.
  10. Perkins, J. (2016), ‘Access Control Policy’, ‘London School of Economics & Political Science IT Services’.
  11. [Castell, Michelle. "Mitigating online account takeovers: The case for education." Retrieved August 27 (2013): 2015.
  12. Arafat, Jahidul, et al. "Emergence of Robust Information Security Management Structure around the world wide Higher Education Institutions: a Multifaceted Security Solution’, International Journal of Computer Science Issues (IJCSI), Vol 9, No. 2, pp. 206-214.
  13. Ahlan, Abdul Rahman, Muharman Lubis, and Arif Ridho Lubis. "Information Security Awareness at the Knowledge-Based Institution: Its Antecedents and Measures." Procedia Computer Science 72 (2015): 361-373.
  14. Delavari, Naeimeh, Somnuk Phon-Amnuaisuk, and M. Reza Beikzadeh. "Data mining application in higher learning institutions." Informatics in Education 7.1 (2008): 31-54.
  15. Mensch, Scott, and LeAnn Wilkie. "Information security activities of college students: An exploratory study." Journal of Management Information and Decision Sciences 14.2 (2011): 91.
  16. Kam, Hwee-Joo, et al. "Information Security Policy Compliance in Higher Education: A Neo-Institutional Perspective." PACIS. 2013.
  17. Saar-Tsechansky, Maytal, and Foster Provost. "Handling missing values when applying classification models." Journal of machine learning research 8.Jul (2007): 1623-1657.
  18. Bhardwaj, Brijesh Kumar, and Saurabh Pal. "Data Mining: A prediction for performance improvement using classification." arXiv preprint arXiv:1201.3418 (2012).
  19. Goebel, Michael, and Le Gruenwald. "A survey of data mining and knowledge discovery software tools." ACM SIGKDD explorations newsletter 1.1 (1999): 20-33.
  20. Patil, Tina R., and S. S. Sherekar. "Performance analysis of Naive Bayes and J48 classification algorithm for data classification." International Journal of Computer Science and Applications 6.2 (2013): 256-261.
  21. Wu, Xindong, et al. "Top 10 algorithms in data mining." Knowledge and information systems 14.1 (2008): 1-37.
  22. Pandey, U. K. and Pal, S., “Data Mining: A prediction of performer or underperformer using classification”, (IJCSIT) International Journal of Computer Science and Information Technology, Vol. 2(2), 2011, 686-690, ISSN:0975-9646.
  23. Pandey, U. K. and Pal, S., “A Data Mining View on Class Room Teaching Language”, (IJCSI) International Journal of Computer Science Issue, Vol. 8, Issue 2, March -2011, 277-282, ISSN:1694-0814.
Index Terms

Computer Science
Information Sciences

Keywords

Cyber security Vulnerability Analysis Information Security Security Guidelines Academic Institutes Naïve Bayes algorithm Prediction