Abstract: Increasing usage of data generation and utilization, the threat of data exploitation and loss also increases. So, the need for cyber security also increases. Using data mining techniques, we ...