Intrusion Detection A Text Mining Based Approach

AI-generated keywords: Intrusion Detection Text Mining System Calls Distance Measure Framework

AI-generated Key Points

  • Intrusion detection is a major threat for organizations
  • Text mining techniques can be used for intrusion detection
  • The paper discusses a distance measure specifically designed for intrusion detection
  • The proposed distance measure is based on a modified Gaussian function
  • The framework aims to provide an efficient and reliable method for detecting intrusions
  • Text mining techniques help identify potential threats and take appropriate actions to prevent them
  • Previous studies have used cosine similarity and binary similarity measures
  • The proposed similarity measure considers frequency and number of common system calls between processes
  • This research contributes to advancing the field of intrusion detection by introducing a novel text mining-based approach
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Gunupudi RajeshKumar, N Mangathayaru, G Narsimha

13 pages, 4 figures, Special issue on Computing Applications and Data Mining, Paper 01021609, International Journal of Computer Science and Information Security (IJCSIS), Vol. 14 S1, February 2016
License: CC BY 4.0

Abstract: Intrusion Detection is one of major threats for organization. The approach of intrusion detection using text processing has been one of research interests which is gaining significant importance from researchers. In text mining based approach for intrusion detection, system calls serve as source for mining and predicting possibility of intrusion or attack. When an application runs, there might be several system calls which are initiated in the background. These system calls form the strong basis and the deciding factor for intrusion detection. In this paper, we mainly discuss the approach for intrusion detection by designing a distance measure which is designed by taking into consideration the conventional Gaussian function and modified to suit the need for similarity function. A Framework for intrusion detection is also discussed as part of this research.

Submitted to arXiv on 12 Mar. 2016

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 1603.03837v1

Intrusion detection is a major threat for organizations and researchers have been working on effective approaches to address this issue. One such approach is the use of text mining techniques for intrusion detection, where system calls are utilized as a source for mining and predicting potential intrusions or attacks. This paper titled "Intrusion Detection - A Text Mining Based Approach" by Gunupudi RajeshKumar, N Mangathayaru, and G Narsimha discusses their research on designing a distance measure specifically for intrusion detection. The proposed distance measure is based on a modified Gaussian function that serves as a similarity function. It considers the similarities between system call sequences and presents a framework for intrusion detection that incorporates this distance measure. This framework aims to provide organizations with an efficient and reliable method to detect intrusions in their systems. By utilizing text mining techniques and analyzing system call patterns, this approach can help identify potential threats and take appropriate actions to prevent them. The paper provides detailed insights into various similarity measures used in previous studies, such as cosine similarity and binary similarity measures. Additionally, it discusses how their proposed similarity measure takes into account not only the frequency but also the number of common system calls between processes. Overall, this research contributes to advancing the field of intrusion detection by introducing a novel text mining-based approach and proposing a new distance measure for detecting intrusions. The framework presented in this paper offers organizations valuable insights into identifying potential threats and enhancing their security measures against intrusions.
Created on 28 Jan. 2024

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.