Abstract
Aims: This paper aims to conduct a Systematic Literature Review (SLR) of the relative applications of text mining in cybersecurity.
Objectives: The amount of data generated worldwide has been attributed to a change in different activities associated with cyber security, and demands a high automation level.
Methods: In the cyber security domain, text mining is an alternative for improving the usefulness of various activities that entail unstructured data. This study searched databases of 516 papers from 2015 to 2021. Out of which, 75 papers are selected for analysis. A detailed evaluation of the selected studies employs sources, techniques, and information extraction on cyber security applications.
Results: This study extends gaps for future studies, such as text processing, availability of datasets, innovative methods, and intelligent text mining.
Conclusion: This study concludes with interesting findings of employing text mining in cybersecurity applications; the researchers need to exploit all related techniques and algorithms in text mining to detect and protect the organization from Cybersecurity applications.
Keywords: Cybersecurity, text mining, natural language processing, data mining, ML techniques.
[http://dx.doi.org/10.1016/j.jnca.2021.103210]
[http://dx.doi.org/10.1016/j.jjimei.2021.100008]
[http://dx.doi.org/10.1109/MIS.2018.111145022]
[http://dx.doi.org/10.1016/j.tele.2021.101593]
[http://dx.doi.org/10.1016/j.techfore.2021.121177]
[http://dx.doi.org/10.1080/19322909.2018.1479673]
[http://dx.doi.org/10.1016/j.jum.2019.11.006]
[http://dx.doi.org/10.1016/j.im.2020.103334]
[http://dx.doi.org/10.1016/j.aap.2020.105899] [PMID: 33285445]
[http://dx.doi.org/10.1016/S1361-3723(21)00009-9]
[http://dx.doi.org/10.1002/widm.1208]
[http://dx.doi.org/10.1016/j.joi.2018.06.006]
[http://dx.doi.org/10.1016/j.fm.2018.04.011] [PMID: 30910089]
[http://dx.doi.org/10.1145/3389684]
[http://dx.doi.org/10.1016/j.compind.2020.103222]
[http://dx.doi.org/10.1016/B978-0-12-818146-1.00001-5]
[http://dx.doi.org/10.1016/j.aei.2020.101152]
[http://dx.doi.org/10.1016/j.asej.2021.03.026]
[http://dx.doi.org/10.1016/j.jbusres.2018.10.055]
[http://dx.doi.org/10.1016/j.trpro.2018.10.105]
[http://dx.doi.org/10.1016/j.ijinfomgt.2019.07.014]
[http://dx.doi.org/10.1016/j.autcon.2018.11.018]
[http://dx.doi.org/10.1016/j.accinf.2020.100469]
[http://dx.doi.org/10.1016/j.knosys.2019.07.032]
[http://dx.doi.org/10.1016/j.solener.2017.11.023]
[http://dx.doi.org/10.1002/9781119711629.ch5]
[http://dx.doi.org/10.1002/poi3.184]
[http://dx.doi.org/10.1002/cpe.5556]
[http://dx.doi.org/10.1002/cpe.5557]
[http://dx.doi.org/10.1016/j.eswa.2016.07.010]
[http://dx.doi.org/10.1007/s10586-016-0539-z]
[http://dx.doi.org/10.1109/ACCESS.2019.2910229]
[http://dx.doi.org/10.1080/00450618.2020.1789742]
[http://dx.doi.org/10.1002/widm.1412]
[http://dx.doi.org/10.1145/3462477]
[http://dx.doi.org/10.1016/j.tourman.2019.104028]
[http://dx.doi.org/10.1016/j.ins.2020.03.036]
[http://dx.doi.org/10.1016/j.dss.2021.113651]
[http://dx.doi.org/10.1016/j.cose.2020.101751]
[http://dx.doi.org/10.1109/JSEN.2021.3060953]
[http://dx.doi.org/10.1016/j.cose.2018.10.009]
[http://dx.doi.org/10.1145/3167132.3167306]
[http://dx.doi.org/10.1007/s12083-019-00832-1]
[http://dx.doi.org/10.1016/j.cose.2016.12.013]
[http://dx.doi.org/10.1002/pra2.2015.145052010082]
[http://dx.doi.org/10.1016/j.future.2019.02.013]
[http://dx.doi.org/10.1007/978-981-16-7610-9_36]
[http://dx.doi.org/10.1016/j.cose.2017.11.017]
[http://dx.doi.org/10.1016/j.compeleceng.2017.02.013]
[http://dx.doi.org/10.1007/978-3-030-93453-8_4]
[http://dx.doi.org/10.1080/0960085X.2021.1931494]
[http://dx.doi.org/10.1002/widm.1366]
[http://dx.doi.org/10.1016/j.eswa.2018.07.011]
[http://dx.doi.org/10.1007/978-981-15-8289-9_72]
[http://dx.doi.org/10.2991/ahis.k.210913.045]
[http://dx.doi.org/10.1109/ISI.2018.8587336]
[http://dx.doi.org/10.1007/s10796-017-9808-5]
[http://dx.doi.org/10.1016/j.cosrev.2021.100413]
[http://dx.doi.org/10.1016/j.dss.2021.113495]
[http://dx.doi.org/10.1016/j.dss.2021.113536]
[http://dx.doi.org/10.1080/07421222.2016.1205918]
[http://dx.doi.org/10.1016/j.im.2018.03.006]
[http://dx.doi.org/10.1016/j.egypro.2018.08.169]
[http://dx.doi.org/10.1007/s12652-020-02789-z]
[http://dx.doi.org/10.1145/2736277.2741083]
[http://dx.doi.org/10.1186/s40537-020-00318-5]
[http://dx.doi.org/10.1109/ICDMW.2017.94]
[http://dx.doi.org/10.1145/3172869]
[http://dx.doi.org/10.1145/2835776.2835803]