A Text Mining-Based Anomaly aZDetection Model in Network Security

1
Mohsen Kakavand
Mohsen Kakavand
2
Norwati Mustapha
Norwati Mustapha
3
Aida Mustapha
Aida Mustapha
4
Mohd Taufik Abdullah
Mohd Taufik Abdullah

Send Message

To: Author

GJCST Volume 14 Issue G5

Article Fingerprint

ReserarchID

R593R

A Text Mining-Based Anomaly aZDetection Model in Network Security Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Anomaly detection systems are extensively used security tools to detect cyber-threats and attack activities in computer systems and networks. In this paper, we present Text Mining-Based Anomaly Detection (TMAD) model. We discuss n-gram text categorization and focus our attention on a main contribution of method TF-IDF (Term frequency, inverse document frequency), which enhance the performance commonly term weighting schemes are used, where the weights reflect the importance of a word in a specific document of the considered collection. Mahalanobis Distances Map (MDM) and Support Vector Machine (SVM) are used to discover hidden correlations between the features and among the packet payloads. Experiments have been accomplished to estimate the performance of TMAD against ISCX dataset 2012 intrusion detection evaluation dataset. The results show TMAD has good accuracy.

27 Cites in Articles

References

  1. Mennatallah Amer,Markus Goldstein,Slim Abdennadher (2013). Enhancing one-class support vector machines for unsupervised anomaly detection.
  2. J Anderson (1980). Computer Security Threat Monitoring And Surveillance.
  3. Rafael Banchs (2013). Text Mining with MATLAB®.
  4. G.-Y Chan,C.-S Lee,S.-H Heng (2013). Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks.
  5. A Christey,R Martin (2007). Vulnerability Type Distributions in CVE.
  6. G Davide,T Brian,(n.D (null). Latin America and the United States: A Documentary History. 2nd ed.
  7. Jonathan Davis,Andrew Clark (2011). Data preprocessing for anomaly based network intrusion detection: A review.
  8. Reda Elbasiony,Elsayed Sallam,Tarek Eltobely,Mahmoud Fahmy (2013). A hybrid network intrusion detection framework based on random forests and weighted k-means.
  9. Juan Estévez-Tapiador,Pedro Garcı́a-Teodoro,Jesús Dı́az-Verdejo (2004). Measuring normality in HTTP traffic for anomaly-based intrusion detection.
  10. C Ezeife,Jingyu Dong,A Aggarwal (2008). SensorWebIDS: a web mining intrusion detection system.
  11. Mouhcine Guennoun,Aboubakr Lbekkouri,Khalil El-Khatib (2008). Selecting the Best Set of Features for Efficient Intrusion Detection in 802.11 Networks.
  12. Andreas Hotho,Andreas Nürnberger,Gerhard Paaß (2005). A Brief Survey of Text Mining.
  13. Ian Witten,Eibe Frank,M (2011). Data Mining Practical Machine Learning Tools and Techniques.
  14. Jiawei Han,Micheline Kamber (2011). Data Mining: Concepts and Techniques (Third Edit.
  15. M Khalilian,N Mustapha,N Sulaiman,A Mamat (2011). Intrusion Detection System with Data Mining Approach: A Review.
  16. C Kruegel,G Vigna,W Robertson (2005). A multi-model approach to the detection of webbased attacks.
  17. Edda Leopold,Jörg Kindermann (2002). Text Categorization with Support Vector Machines. How to Represent Texts in Input Space?.
  18. M Mahoney,P Chan (1998). Learning rules for anomaly detection of hostile network traffic.
  19. M Malek,F Harmantzis (2004). DATA MINING TECHNIQUES FOR SECURITY OF WEB SERVICES.
  20. R Perdisci,D Ariu,P Fogla,G Giacinto,W Lee (2009). McPAD : A Multiple Classifier System for Accurate Payload-based Anomaly Detection.
  21. W Robertson,G Vigna,C Kruegel,R Kemmerer (2006). Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks.
  22. B Scholkopf,Kah-Kay Sung,C Burges,F Girosi,P Niyogi,T Poggio,V Vapnik (1996). Comparing support vector machines with Gaussian kernels to radial basis function classifiers.
  23. Fabrizio Sebastiani (2002). Machine learning in automated text categorization.
  24. Ali Shiravi,Hadi Shiravi,Mahbod Tavallaee,Ali Ghorbani (2012). Toward developing a systematic approach to generate benchmark datasets for intrusion detection.
  25. Stuart Staniford,James Hoagland,Joseph Mcalerney (2002). Practical automated detection of stealthy portscans.
  26. K Wang,S Stolfo (2004). Recent Advances in Intrusion Detection.
  27. Jing Zhao,Houkuan Huang,Shengfeng Tian,Xiang Zhao (2009). Applications of HMM in Protocol Anomaly Detection.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Mohsen Kakavand. 2015. \u201cA Text Mining-Based Anomaly aZDetection Model in Network Security\u201d. Global Journal of Computer Science and Technology - G: Interdisciplinary GJCST-G Volume 14 (GJCST Volume 14 Issue G5): .

Download Citation

Issue Cover
GJCST Volume 14 Issue G5
Pg. 23- 31
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
Not Found
Version of record

v1.2

Issue date

February 5, 2015

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 8370
Total Downloads: 2133
2026 Trends
Research Identity (RIN)
Related Research

Published Article

Anomaly detection systems are extensively used security tools to detect cyber-threats and attack activities in computer systems and networks. In this paper, we present Text Mining-Based Anomaly Detection (TMAD) model. We discuss n-gram text categorization and focus our attention on a main contribution of method TF-IDF (Term frequency, inverse document frequency), which enhance the performance commonly term weighting schemes are used, where the weights reflect the importance of a word in a specific document of the considered collection. Mahalanobis Distances Map (MDM) and Support Vector Machine (SVM) are used to discover hidden correlations between the features and among the packet payloads. Experiments have been accomplished to estimate the performance of TMAD against ISCX dataset 2012 intrusion detection evaluation dataset. The results show TMAD has good accuracy.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

A Text Mining-Based Anomaly aZDetection Model in Network Security

Mohsen Kakavand
Mohsen Kakavand
Norwati Mustapha
Norwati Mustapha
Aida Mustapha
Aida Mustapha
Mohd Taufik Abdullah
Mohd Taufik Abdullah

Research Journals