Latent Text Mining for Cybercrime Forensics

Provided by: International Association of Computer Science & Information Technology (IACSIT)
Topic: Big Data
Format: PDF
Recent research reveals that the number of cyber-attacks has been doubled in the past three years. This is a devastating growth of the number of cyber-attacks, and it reveals a serious business problem around the world. Existing Intrusion Detection Systems (IDSs), Intrusion Prevention Systems (IPSs), and anti-malware systems mainly rely on low-level network traffic features or program code signatures to detect cyber-attacks. However, since hackers can constantly change their attack tactics by, it is extremely difficult for existing security solutions to detect cyber-attacks.

Find By Topic