Reference Hub2
Research Trends for Malware and Intrusion Detection on Network Systems: A Topic Modelling Approach

Research Trends for Malware and Intrusion Detection on Network Systems: A Topic Modelling Approach

Santosh Kumar Smmarwar, Govind P. Gupta, Sanjay Kumar
Copyright: © 2022 |Pages: 22
ISBN13: 9781799877899|ISBN10: 1799877892|ISBN13 Softcover: 9781799877905|EISBN13: 9781799877912
DOI: 10.4018/978-1-7998-7789-9.ch002
Cite Chapter Cite Chapter

MLA

Smmarwar, Santosh Kumar, et al. "Research Trends for Malware and Intrusion Detection on Network Systems: A Topic Modelling Approach." Advances in Malware and Data-Driven Network Security, edited by Brij B. Gupta, IGI Global, 2022, pp. 19-40. https://doi.org/10.4018/978-1-7998-7789-9.ch002

APA

Smmarwar, S. K., Gupta, G. P., & Kumar, S. (2022). Research Trends for Malware and Intrusion Detection on Network Systems: A Topic Modelling Approach. In B. Gupta (Ed.), Advances in Malware and Data-Driven Network Security (pp. 19-40). IGI Global. https://doi.org/10.4018/978-1-7998-7789-9.ch002

Chicago

Smmarwar, Santosh Kumar, Govind P. Gupta, and Sanjay Kumar. "Research Trends for Malware and Intrusion Detection on Network Systems: A Topic Modelling Approach." In Advances in Malware and Data-Driven Network Security, edited by Brij B. Gupta, 19-40. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-7998-7789-9.ch002

Export Reference

Mendeley
Favorite

Abstract

With more uses of internet-based services, the risk of cyberattacks is growing continuously. To analyze these research trends for malware and intrusion detection, the authors applied the topic modeling approach in the study by using the LDA (latent dirichlet allocation) and calculating the maximum and minimum probability of the words, which appears in the large collection of text. The LDA technique is useful in finding the hidden topics for further research in the areas of network and cybersecurity. In this chapter, they collected the abstract of two thousand papers from the Scopus library from 2014 to 2021. These collected papers are from reputed publications such as Elsevier, Springer, and IEEE Transactions. The main aim of this study is to find research trends based on keywords that are untouched or on which less research work has been done. To the best of the authors' knowledge, this will be the first study done by using the LDA technique for topic modeling in the areas of network security to demonstrate the research gap and trends for malware and intrusion detection systems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.