An Integrated Cyber Security Monitoring System Using Correlation-based Techniques

被引:0
|
作者
Wu, Qishi [1 ]
Ferebee, Denise [1 ]
Lin, Yunyue [1 ]
Dasgupta, Dipankar [1 ]
机构
[1] Univ Memphis, Dept Comp Sci, Memphis, TN 38152 USA
来源
2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEM OF SYSTEMS ENGINEERING SOSE 2009 | 2009年
关键词
Cyber security; decision fusion; event correlation; random matrix theory; NETWORKS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose an adaptive cyber security monitoring system that integrates a number of component techniques to coiled time-series situation information, perform intrusion detection, keep track of event evolution, and characterize and identify security events so corresponding defense actions can be taken in a timely and effective manner. Particularly, we employ a decision fusion algorithm with analytically proven performance guarantee for intrusion detection based on local votes from distributed sensors. Different from the traditional rule-based pattern matching technique, security events in the proposed system are represented in a graphical form of correlation networks using random matrix theory and identified through the computation of network similarity measurement. Extensive simulation results on event identification illustrate the efficacy of the proposed system.
引用
收藏
页码:164 / 169
页数:6
相关论文
共 50 条
  • [1] Automation of Asset Inventory for Cyber Security: Investigation of Event Correlation-Based Technique
    Kotenko, Igor
    Doynikova, Elena
    Fedorchenko, Andrey
    Desnitsky, Vasily
    ELECTRONICS, 2022, 11 (15)
  • [2] An intelligent cyber security phishing detection system using deep learning techniques
    Ala Mughaid
    Shadi AlZu’bi
    Adnan Hnaif
    Salah Taamneh
    Asma Alnajjar
    Esraa Abu Elsoud
    Cluster Computing, 2022, 25 : 3819 - 3828
  • [3] An intelligent cyber security phishing detection system using deep learning techniques
    Mughaid, Ala
    AlZu'bi, Shadi
    Hnaif, Adnan
    Taamneh, Salah
    Alnajjar, Asma
    Abu Elsoud, Esraa
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (06): : 3819 - 3828
  • [4] An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System
    Kure, Halima Ibrahim
    Islam, Shareeful
    Razzaque, Mohammad Abdur
    APPLIED SCIENCES-BASEL, 2018, 8 (06):
  • [5] Higher-order correlation-based multivariate statistical process monitoring
    Lv, Feiya
    Wen, Chenglin
    Liu, Meiqin
    Bao, Zhejing
    JOURNAL OF CHEMOMETRICS, 2018, 32 (08)
  • [6] Using Integrated System Theory Approach to Assess Security for SCADA Systems Cyber Security for Critical Infrastructures: A Pilot Study
    Ismail, Suhaila
    Sitnikova, Elena
    Slay, Jill
    2014 11TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2014, : 1000 - 1006
  • [7] A FRAMEWORK FOR EVALUATION OF CYBER SECURITY RISKS USING MONITORING DATA
    Lieuwen, Timothy
    Perullo, Christopher
    Kee, Jared
    PROCEEDINGS OF ASME TURBO EXPO 2023: TURBOMACHINERY TECHNICAL CONFERENCE AND EXPOSITION, GT2023, VOL 6, 2023,
  • [8] Using correlation-based measures to select classifiers for decision fusion
    Goebel, K
    Yan, WZ
    MULTISENSOR, MULTISOURCE INFORMATION FUSION: ARCHITECTURES, ALGORITHMS AND APPLICATIONS 2005, 2005, 5813 : 180 - 191
  • [9] Cyber Security Protocol for Secure Traffic Monitoring Systems using PUF-based Key Management
    Pudi, Vikramkumar
    Bodapati, Srinivasu
    Kumar, Sachin
    Chattopadhyay, Anupam
    2020 6TH IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2020) (FORMERLY INIS), 2020, : 103 - 108
  • [10] A Graph Similarity-based Approach to Security Event Analysis Using Correlation Techniques
    Wu, Qishi
    Gu, Yi
    Cui, Xiaohui
    Moka, Praneeth
    Lin, Yunyue
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,