Security Problem Detection of Hidden Data in Unstructured Log Messages With a Novel Text Mining Technique

Authors(2) :-Paridha Oza, Mr. Premkumar

Text mining is an area where ample possibilites of research is being opened because of large data being shared everyday with the use of applicaitions and social media, both online and offline. Security here is a concern while passing textual infromation in such ways. Further more the logs generated with these data has all the important information in it. In text mining the wide area of text analysis contains machine learning which is further inherited from artificial intelligence. In text mining applications, information from Document is present in the form of Text along with Side Information or Metadata. XML documents found as RSS feed and other links generated for web pages have title of the document, author name or date of Publication which are present in the text document. Such metadata may possess a lot of information for the clustering purposes. Here there are possibilities of delievering unclear data. Using metadata for analysing information without filtering it, can result to lower security as well as data leakage. To improvise the results, we have used an efficient Feature Selection method to perform the mining process to select the metadata or xml tags which is useful for Clustering so as to maximize the advantages from using it. In my research, I have added process to find words that are not commonly being processed. I am expecting to get better results than the earlier researches by modifying the process.

Authors and Affiliations

Paridha Oza
Computer Engineering Department, Silver Oak College of Engineering & Technology, Ahmedabad, Gujarat, India
Mr. Premkumar
Computer Engineering Department, Silver Oak College of Engineering & Technology, Ahmedabad, Gujarat, India

Security,Text Mining,Unstructured data,IARPA Dataset,clusters,Threat Detection

  1. J. Joby and J. Korra, "Accessing Accurate Documents by Mining Auxiliary Document Information," 2015 Second International Conference on Advances in Computing and Communication Engineering, Dehradun, 2015, pp. 634-638.
  2. Suh-Lee, Ju-Yeon Jo and Yoohwan Kim, "Text mining for security threat detection discovering hidden information in unstructured log messages," 2016 IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, 2016, pp. 252-260.
  3. P J. Joby and J. Korra, "Accessing Accurate Documents by Mining Auxiliary Document Information," 2015 Second International Conference on Advances in Computing and Communication Engineering, Dehradun, 2015, pp. 634-638.
  4. R E. Thomas and S. S. Khan, "Improved clustering technique using metadata for text mining," 2016 International Conference on Communication and Electronics Systems (ICCES), Coimbatore, 2016, pp. 1-5.
  5. Garima, H. Gulati and P. K. Singh, "Clustering techniques in data mining: A comparison," 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2015, pp. 410-415.
  6. https://www.predict.org
  7. Packet Clearing House, SKAION 2006 IARPA Dataset. http://pch.net.
  8. S.Vijayarani et al , International Journal of Computer Science & Communication Networks,Vol 5(1),7-16.
  9. Widodo and W. C. Wibowo, "Improving classification performance by extending documents terms," 2014 International Conference on Data and Software Engineering (ICODSE), Bandung, 2014, pp. 1-5.
  10. Kanya, S. Geetha, “Information Extraction -a text mining approach” Information and Communication Technology in Electrical Sciences (ICTES 2007), 2007. ICTES. IET-UK International Conference .
  11. Text Mining with R: A Tidy Approach by Julia singe, David Robinson.

Publication Details

Published in : Volume 4 | Issue 4 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1022-1025
Manuscript Number : IJSRSET1844348
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Paridha Oza, Mr. Premkumar, " Security Problem Detection of Hidden Data in Unstructured Log Messages With a Novel Text Mining Technique , International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 4, pp.1022-1025, March-April-2018. Citation Detection and Elimination     |     
Journal URL : https://ijsrset.com/IJSRSET1844348

Article Preview