SlideShare a Scribd company logo
Deep Encrypted Text Categorization
Vinayakumar R1, K.P Soman1 and Prabaharan Poornachandran2
1Centre for Computational Engineering and Networking (CEN), Amrita School of
Engineering, Coimbatore, Amrita Vishwa Vidyapeetham,
Amrita University, India.
2Center for Cyber Security Systems and Networks, Amrita School of Engineering,
Amritapuri, Amrita Vishwa Vidyapeetham,
Amrita University, India.
Outline
• Introduction
• Methodology
• Description of the data set and Results
• Summary
• Future Work
• References
2
Introduction
• Text categorization focuses on classifying text
to its categories and it has roots in many
natural language processing (NLP)
applications, mainly in content security.
• Content security is an approach used by
network administrator to safeguard internet
security from malicious attacks with the text
available in online.
3
Methodology
• Text categorization has been existing as a difficult
task mainly due to the traditional machine
learning approaches relies on bag-of-words
(BoW) model or bag-of-n-gram vectors, where
unigrams, bigrams, n-grams, punctuation, stop
words, emoticons, negation words, lexicons,
elongated words and other delineated patterns
are considered as features.
• To alleviate, we have used word embedding with
deep learning specifically recurrent neural
network and long short-term memory.
4
Contd.
Figure 1. proposed deep learning architecture
for encrypted text categorization
5
Description of the data set and Results
The dataset is sourced from 6 online news media: The New
Zealand Herald [1], Reuters [2], The Times [3] , Yahoo News [4],
BBC [5] and The Press [6]. Business, entertainment, sport,
technology, and travel are the selected five news categories.
Table 1. Description of Data set
6
Contd.
Table 2. 5-fold cross-validation results of RNN and LSTM
networks
7
Contd.
Table 3. Summary of test results using 3 layer stacked LSTM
network with 32 memory blocks
8
Summary
• The proposed deep learning architecture for
encrypted text categorization avoids the
feature engineering method, thereby itself
serves as a robust in handling drifting of
encrypted texts in the scenario of adversarial
machine learning setting.
• LSTM network performed well in comparison
to the RNN.
9
Future Work
• we are lack behind in showing the
experimental results for encrypted text
categorization with more complex
architecture. The reported results can be
further enhanced by using more complex
architecture by using an advanced hardware
and training in a distributed environment.
10
References
[1] www.nzherald.co.nz
[2] www.reuters.com
[3] www.timesonline.co.uk
[4] news.yahoo.com
[5] www.bbc.co.uk
[6] www.stuff.co.nz
11

More Related Content

DOCX
JAWAD KHAN CV
PDF
An effective attack preventing routing approach in speed network in manets
DOCX
Pg. 03 question one assignment 1deadline monday
PDF
Ista presentation-malicious url
PDF
03 fauzi indonesian 9456 11nov17 edit septian
PDF
Novel framework using dynamic passphrase towards secure and energy-efficient ...
PDF
IDS IN TELECOMMUNICATION NETWORK USING PCA
PDF
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
JAWAD KHAN CV
An effective attack preventing routing approach in speed network in manets
Pg. 03 question one assignment 1deadline monday
Ista presentation-malicious url
03 fauzi indonesian 9456 11nov17 edit septian
Novel framework using dynamic passphrase towards secure and energy-efficient ...
IDS IN TELECOMMUNICATION NETWORK USING PCA
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...

What's hot (17)

DOCX
Different types of network topologies
PPTX
A technical paper presentation on Evaluation of Deep Learning techniques in S...
PDF
Pattern recognition system based on support vector machines
PDF
Icacci presentation-intrusion
PDF
A Heuristic Approach for Network Data Clustering
PDF
Hybrid ga svm for efficient feature selection in e-mail classification
PDF
11.hybrid ga svm for efficient feature selection in e-mail classification
PDF
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
PDF
Abstract matsumura
PDF
Intrusion Detection System Using Self Organizing Map Algorithms
PDF
IRJET- Suspicious Email Detection System
PDF
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
PDF
IRJET-Impact of Manual VS Automatic Transfer Switching on Reliability of Powe...
PDF
Sohail cv (updated) (1)
PDF
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
PDF
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
PDF
M.tech computerunitwise
Different types of network topologies
A technical paper presentation on Evaluation of Deep Learning techniques in S...
Pattern recognition system based on support vector machines
Icacci presentation-intrusion
A Heuristic Approach for Network Data Clustering
Hybrid ga svm for efficient feature selection in e-mail classification
11.hybrid ga svm for efficient feature selection in e-mail classification
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
Abstract matsumura
Intrusion Detection System Using Self Organizing Map Algorithms
IRJET- Suspicious Email Detection System
A NOVEL APPROACH FOR GENERATING FACE TEMPLATE USING BDA
IRJET-Impact of Manual VS Automatic Transfer Switching on Reliability of Powe...
Sohail cv (updated) (1)
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
M.tech computerunitwise
Ad

Similar to Icacci presentation-isi-text categorization (20)

PDF
Icacci presentation-anomaly
PDF
IRJET- Survey on Text Error Detection using Deep Learning
PDF
Icacci presentation-cnn intrusion
PDF
IRJET- Survey on Generating Suggestions for Erroneous Part in a Sentence
PDF
Ista presentation-dga
PDF
Text Summarization of Food Reviews using AbstractiveSummarization and Recurre...
PDF
IRJET - Text Detection in Natural Scene Images: A Survey
PDF
IRJET- Visual Question Answering using Combination of LSTM and CNN: A Survey
PDF
Handwritten Digit Recognition Using CNN
PDF
C4 balajiprasath
PDF
Performance Comparison between Pytorch and Mindspore
PDF
Ista presentation-apache spark
PDF
DEEP LEARNING SOLUTIONS FOR SOURCE CODE VULNERABILITY DETECTION
PDF
Deep Learning Approach for Intelligent Named Entity Recognition of Cyber Secu...
PDF
Deep Learning in Text Recognition and Text Detection : A Review
PDF
Ista presentation-android
PPTX
Cyber Attack Detection and protection using machine learning algorithm
PPTX
ML-Approach-for-Telecom-Network-Operations-Management.pptx
PDF
IRJET- Factoid Question and Answering System
PDF
ML Project Presentation - Predictive text input generation
Icacci presentation-anomaly
IRJET- Survey on Text Error Detection using Deep Learning
Icacci presentation-cnn intrusion
IRJET- Survey on Generating Suggestions for Erroneous Part in a Sentence
Ista presentation-dga
Text Summarization of Food Reviews using AbstractiveSummarization and Recurre...
IRJET - Text Detection in Natural Scene Images: A Survey
IRJET- Visual Question Answering using Combination of LSTM and CNN: A Survey
Handwritten Digit Recognition Using CNN
C4 balajiprasath
Performance Comparison between Pytorch and Mindspore
Ista presentation-apache spark
DEEP LEARNING SOLUTIONS FOR SOURCE CODE VULNERABILITY DETECTION
Deep Learning Approach for Intelligent Named Entity Recognition of Cyber Secu...
Deep Learning in Text Recognition and Text Detection : A Review
Ista presentation-android
Cyber Attack Detection and protection using machine learning algorithm
ML-Approach-for-Telecom-Network-Operations-Management.pptx
IRJET- Factoid Question and Answering System
ML Project Presentation - Predictive text input generation
Ad

More from vinaykumar R (6)

PDF
Ista presentation-ecg
PDF
Icacci presentation-isi-ssh traffic
PDF
Icacci presentation-ssh traffic
PDF
Icacci presentation-isi-ransomware
PDF
Icacci presentation- deep android
PDF
Icacci2017 poster template
Ista presentation-ecg
Icacci presentation-isi-ssh traffic
Icacci presentation-ssh traffic
Icacci presentation-isi-ransomware
Icacci presentation- deep android
Icacci2017 poster template

Recently uploaded (20)

PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PDF
annual-report-2024-2025 original latest.
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PPTX
Introduction to Knowledge Engineering Part 1
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PPTX
Computer network topology notes for revision
PPTX
Market Analysis -202507- Wind-Solar+Hybrid+Street+Lights+for+the+North+Amer...
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
PPTX
IB Computer Science - Internal Assessment.pptx
PPT
Reliability_Chapter_ presentation 1221.5784
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
PDF
Lecture1 pattern recognition............
PPTX
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
annual-report-2024-2025 original latest.
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
Introduction to Knowledge Engineering Part 1
climate analysis of Dhaka ,Banglades.pptx
Data_Analytics_and_PowerBI_Presentation.pptx
Computer network topology notes for revision
Market Analysis -202507- Wind-Solar+Hybrid+Street+Lights+for+the+North+Amer...
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
IB Computer Science - Internal Assessment.pptx
Reliability_Chapter_ presentation 1221.5784
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
STUDY DESIGN details- Lt Col Maksud (21).pptx
Lecture1 pattern recognition............
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
Acceptance and paychological effects of mandatory extra coach I classes.pptx

Icacci presentation-isi-text categorization

  • 1. Deep Encrypted Text Categorization Vinayakumar R1, K.P Soman1 and Prabaharan Poornachandran2 1Centre for Computational Engineering and Networking (CEN), Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, Amrita University, India. 2Center for Cyber Security Systems and Networks, Amrita School of Engineering, Amritapuri, Amrita Vishwa Vidyapeetham, Amrita University, India.
  • 2. Outline • Introduction • Methodology • Description of the data set and Results • Summary • Future Work • References 2
  • 3. Introduction • Text categorization focuses on classifying text to its categories and it has roots in many natural language processing (NLP) applications, mainly in content security. • Content security is an approach used by network administrator to safeguard internet security from malicious attacks with the text available in online. 3
  • 4. Methodology • Text categorization has been existing as a difficult task mainly due to the traditional machine learning approaches relies on bag-of-words (BoW) model or bag-of-n-gram vectors, where unigrams, bigrams, n-grams, punctuation, stop words, emoticons, negation words, lexicons, elongated words and other delineated patterns are considered as features. • To alleviate, we have used word embedding with deep learning specifically recurrent neural network and long short-term memory. 4
  • 5. Contd. Figure 1. proposed deep learning architecture for encrypted text categorization 5
  • 6. Description of the data set and Results The dataset is sourced from 6 online news media: The New Zealand Herald [1], Reuters [2], The Times [3] , Yahoo News [4], BBC [5] and The Press [6]. Business, entertainment, sport, technology, and travel are the selected five news categories. Table 1. Description of Data set 6
  • 7. Contd. Table 2. 5-fold cross-validation results of RNN and LSTM networks 7
  • 8. Contd. Table 3. Summary of test results using 3 layer stacked LSTM network with 32 memory blocks 8
  • 9. Summary • The proposed deep learning architecture for encrypted text categorization avoids the feature engineering method, thereby itself serves as a robust in handling drifting of encrypted texts in the scenario of adversarial machine learning setting. • LSTM network performed well in comparison to the RNN. 9
  • 10. Future Work • we are lack behind in showing the experimental results for encrypted text categorization with more complex architecture. The reported results can be further enhanced by using more complex architecture by using an advanced hardware and training in a distributed environment. 10
  • 11. References [1] www.nzherald.co.nz [2] www.reuters.com [3] www.timesonline.co.uk [4] news.yahoo.com [5] www.bbc.co.uk [6] www.stuff.co.nz 11