A Text Mining-Based Anomaly aZDetection Model in Network Security

Article ID

R593R

A Text Mining-Based Anomaly aZDetection Model in Network Security

Mohsen Kakavand
Mohsen Kakavand
Norwati Mustapha
Norwati Mustapha
Aida Mustapha
Aida Mustapha
Mohd Taufik Abdullah
Mohd Taufik Abdullah
DOI

Abstract

Anomaly detection systems are extensively used security tools to detect cyber-threats and attack activities in computer systems and networks. In this paper, we present Text Mining-Based Anomaly Detection (TMAD) model. We discuss n-gram text categorization and focus our attention on a main contribution of method TF-IDF (Term frequency, inverse document frequency), which enhance the performance commonly term weighting schemes are used, where the weights reflect the importance of a word in a specific document of the considered collection. Mahalanobis Distances Map (MDM) and Support Vector Machine (SVM) are used to discover hidden correlations between the features and among the packet payloads. Experiments have been accomplished to estimate the performance of TMAD against ISCX dataset 2012 intrusion detection evaluation dataset. The results show TMAD has good accuracy.

A Text Mining-Based Anomaly aZDetection Model in Network Security

Anomaly detection systems are extensively used security tools to detect cyber-threats and attack activities in computer systems and networks. In this paper, we present Text Mining-Based Anomaly Detection (TMAD) model. We discuss n-gram text categorization and focus our attention on a main contribution of method TF-IDF (Term frequency, inverse document frequency), which enhance the performance commonly term weighting schemes are used, where the weights reflect the importance of a word in a specific document of the considered collection. Mahalanobis Distances Map (MDM) and Support Vector Machine (SVM) are used to discover hidden correlations between the features and among the packet payloads. Experiments have been accomplished to estimate the performance of TMAD against ISCX dataset 2012 intrusion detection evaluation dataset. The results show TMAD has good accuracy.

Mohsen Kakavand
Mohsen Kakavand
Norwati Mustapha
Norwati Mustapha
Aida Mustapha
Aida Mustapha
Mohd Taufik Abdullah
Mohd Taufik Abdullah

No Figures found in article.

Mohsen Kakavand. 2015. “. Global Journal of Computer Science and Technology – G: Interdisciplinary GJCST-G Volume 14 (GJCST Volume 14 Issue G5): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Issue Cover
GJCST Volume 14 Issue G5
Pg. 23- 31
Classification
Not Found
Keywords
Article Matrices
Total Views: 8324
Total Downloads: 2187
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

A Text Mining-Based Anomaly aZDetection Model in Network Security

Mohsen Kakavand
Mohsen Kakavand
Norwati Mustapha
Norwati Mustapha
Aida Mustapha
Aida Mustapha
Mohd Taufik Abdullah
Mohd Taufik Abdullah

Research Journals