Exploring network security threats through text mining techniques: a comprehensive analysis

Authors

DOI:

https://doi.org/10.11591/csit.v4i3.pp258-267

Keywords:

Classification, Clustering, Network risk analysis, Network security, Text mining

Abstract

In response to the escalating cybersecurity threats, this research focuses on leveraging text mining techniques to analyze network security data effectively. The study utilizes user-generated reports detailing attacks on server networks. Employing clustering algorithms, these reports are grouped based on threat levels. Additionally, a classification algorithm discerns whether network activities pose security risks. The research achieves a noteworthy 93% accuracy in text classification, showcasing the efficacy of these techniques. The novelty lies in classifying security threat report logs according to their threat levels. Prioritizing high-risk threats, this approach aids network management in strategic focus. By enabling swift identification and categorization of network security threats, this research equips organizations to take prompt, targeted actions, enhancing overall network security.

Downloads

Published

2023-11-01

How to Cite

[1]
T. Wahyuningsih, I. Sembiring, A. Setiawan, and I. Setyawan, “Exploring network security threats through text mining techniques: a comprehensive analysis”, Comput Sci Inf Technol, vol. 4, no. 3, pp. 258–267, Nov. 2023.

Issue

Section

Articles

Similar Articles

1 2 3 4 5 6 7 8 > >> 

You may also start an advanced similarity search for this article.