Text this: Clustering perception mining of network protocol’s stealth attack behavior