An Integrated Cyber Security Monitoring System Using Correlation-based Techniques

被引:0
|
作者
Wu, Qishi [1 ]
Ferebee, Denise [1 ]
Lin, Yunyue [1 ]
Dasgupta, Dipankar [1 ]
机构
[1] Univ Memphis, Dept Comp Sci, Memphis, TN 38152 USA
来源
2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEM OF SYSTEMS ENGINEERING SOSE 2009 | 2009年
关键词
Cyber security; decision fusion; event correlation; random matrix theory; NETWORKS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose an adaptive cyber security monitoring system that integrates a number of component techniques to coiled time-series situation information, perform intrusion detection, keep track of event evolution, and characterize and identify security events so corresponding defense actions can be taken in a timely and effective manner. Particularly, we employ a decision fusion algorithm with analytically proven performance guarantee for intrusion detection based on local votes from distributed sensors. Different from the traditional rule-based pattern matching technique, security events in the proposed system are represented in a graphical form of correlation networks using random matrix theory and identified through the computation of network similarity measurement. Extensive simulation results on event identification illustrate the efficacy of the proposed system.
引用
收藏
页码:164 / 169
页数:6
相关论文
共 50 条
  • [21] A Study of Cyber Security Policy in Industrial Control System using Data Diodes
    Jeon, Boo-Sun
    Na, Jung-Chan
    2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 314 - 317
  • [22] Adversarial attacks on machine learning-based cyber security systems: a survey of techniques and defences
    Patel, Pratik S.
    Panchal, Pooja
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2025, 17 (1-2)
  • [23] An Improved Integrated Prediction Method of Cyber Security Situation Based on Spatial-time Analysis
    Fan, Zhijie
    Tan, Zhiping
    Tan, Chengxiang
    Li, Xin
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (06): : 1789 - 1800
  • [24] Towards Real-Time Distinction of Power System Faults and Cyber Attacks on Digital Substations using Cyber-Physical Event Correlation
    Semertzis, Ioannis
    Goyel, Himanshu
    Rajkumar, Vetrivel S.
    Presekal, Alfan
    Stefanov, Alexandru
    Palensky, Peter
    2024 12TH WORKSHOP ON MODELING AND SIMULATION OF CYBER-PHYSICAL ENERGY SYSTEMS, MSCPES, 2024,
  • [25] Assessing the Security of a Cyber-Physical System Based on an Analysis of Malware Signatures
    Moskvin, D. A.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2023, 57 (08) : 894 - 903
  • [26] Assessing the Security of a Cyber-Physical System Based on an Analysis of Malware Signatures
    D. A. Moskvin
    Automatic Control and Computer Sciences, 2023, 57 : 894 - 903
  • [27] Quantum communication based cyber security analysis using artificial intelligence with IoMT
    Han, Huimin
    Yao, Jun
    Wu, Yujun
    Dou, Yingyan
    Fu, Jingjuan
    OPTICAL AND QUANTUM ELECTRONICS, 2024, 56 (04)
  • [28] Decarbonization Transportation: Evaluating Role of Cyber Security in Transportation sector based on Neutrosophic Techniques in a Climate of Uncertainty
    Saber N.E.
    Mohamed M.
    AbdelAziz N.M.
    Neutrosophic Sets and Systems, 2023, 60 : 570 - 582
  • [29] Improving risk assessment model of cyber security using fuzzy logic inference system
    Alali, Mansour
    Almogren, Ahmad
    Hassan, Mohammad Mehedi
    Rassan, Iehab A. L.
    Bhuiyan, Md Zakirul Alam
    COMPUTERS & SECURITY, 2018, 74 : 323 - 339
  • [30] Cyber Security Investment Cost-Benefit Investigation Using System Dynamics Modelling
    Oosthuizen, Rudolph
    Pretorius, Leon
    Mouton, Francois
    Molekoa, Mirriam
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, : 304 - 314