{"title":"Intrusion Detection Using Text Processing Techniques: A Recent Survey","authors":"G. R. Kumar, N. Mangathayaru, G. Narasimha","doi":"10.1145/2832987.2833067","DOIUrl":null,"url":null,"abstract":"Intrusion Detection is one of the major threats for any organization of any size. The approach of intrusion detection using text processing has been one of the research interests among researchers working in the area of the network and information security. In this approach for intrusion detection, the system calls serve as the source for mining and predicting any chance of intrusion. When an application runs, there might be several system calls which are initiated in the background. These system calls form the basis and the deciding factor for intrusion detection. We perform an extensive survey on Intrusion detection using text mining techniques and validate the suitability of various kernel measures published in the literature. We finally come out with the research directions for intrusion detection which have not been discussed in detail in the literature. We hope this survey will be useful for researchers working in the direction of intrusion detection using text mining techniques.","PeriodicalId":416001,"journal":{"name":"Proceedings of the The International Conference on Engineering & MIS 2015","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"32","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the The International Conference on Engineering & MIS 2015","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2832987.2833067","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 32
Abstract
Intrusion Detection is one of the major threats for any organization of any size. The approach of intrusion detection using text processing has been one of the research interests among researchers working in the area of the network and information security. In this approach for intrusion detection, the system calls serve as the source for mining and predicting any chance of intrusion. When an application runs, there might be several system calls which are initiated in the background. These system calls form the basis and the deciding factor for intrusion detection. We perform an extensive survey on Intrusion detection using text mining techniques and validate the suitability of various kernel measures published in the literature. We finally come out with the research directions for intrusion detection which have not been discussed in detail in the literature. We hope this survey will be useful for researchers working in the direction of intrusion detection using text mining techniques.