An Integrated Cyber Security Monitoring System Using Correlation-based Techniques

被引:0
|
作者
Wu, Qishi [1 ]
Ferebee, Denise [1 ]
Lin, Yunyue [1 ]
Dasgupta, Dipankar [1 ]
机构
[1] Univ Memphis, Dept Comp Sci, Memphis, TN 38152 USA
来源
2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEM OF SYSTEMS ENGINEERING SOSE 2009 | 2009年
关键词
Cyber security; decision fusion; event correlation; random matrix theory; NETWORKS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose an adaptive cyber security monitoring system that integrates a number of component techniques to coiled time-series situation information, perform intrusion detection, keep track of event evolution, and characterize and identify security events so corresponding defense actions can be taken in a timely and effective manner. Particularly, we employ a decision fusion algorithm with analytically proven performance guarantee for intrusion detection based on local votes from distributed sensors. Different from the traditional rule-based pattern matching technique, security events in the proposed system are represented in a graphical form of correlation networks using random matrix theory and identified through the computation of network similarity measurement. Extensive simulation results on event identification illustrate the efficacy of the proposed system.
引用
收藏
页码:164 / 169
页数:6
相关论文
共 50 条
  • [41] Cyber Security Protection of Power System Equipment Based on Chip-Level Trusted Computing
    Xi, Wei
    Li, Xiaobo
    Feng, Qihui
    Yao, Hao
    Cai, Tiantian
    Yu, Yang
    FRONTIERS IN ENERGY RESEARCH, 2022, 10
  • [42] Sustainable cyber security for utility facilities control system based on defense-in-depth concept
    Takano, Masatoshi
    PROCEEDINGS OF SICE ANNUAL CONFERENCE, VOLS 1-8, 2007, : 2901 - 2904
  • [43] Challenges and research directions for heterogeneous cyber-physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture
    Yoo, Hyunguk
    Shon, Taeshik
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 61 : 128 - 136
  • [44] A Cyber Security Monitoring Approach for Low-voltage Distributed Generation Control System Using Both Network Traffic Data and Side-channel Information
    Si, Jiandong
    Liu, Huaiyu
    Zheng, Zihuai
    Jin, Xueqi
    Zhang, Dongbo
    Wang, Zhouhong
    Pan, Kaikai
    2022 5TH INTERNATIONAL CONFERENCE ON ELECTRONICS AND ELECTRICAL ENGINEERING TECHNOLOGY, EEET, 2022, : 104 - 109
  • [45] Design of Efficient Based Artificial Intelligence Approaches for Sustainable of Cyber Security in Smart Industrial Control System
    Alzahrani, Ali
    Aldhyani, Theyazn H. H.
    SUSTAINABILITY, 2023, 15 (10)
  • [46] An integrated monitoring system based on deep learning tools for industrial process
    Rodriguez-Ramos, Adrian
    Verde, Cristina
    Llanes-Santiago, Orestes
    IFAC PAPERSONLINE, 2024, 58 (04): : 168 - 173
  • [47] Graphical Evolutionary Game Model of Virus-Based Intrusion to Power System for Long-Term Cyber-Security Risk Evaluation
    Li, Boda
    Chen, Ying
    Huang, Shaowei
    Yao, Rui
    Xia, Yue
    Mei, Shengwei
    IEEE ACCESS, 2019, 7 : 178605 - 178617
  • [48] Enhancing the security in cyber-world by detecting the botnets using ensemble classification based machine learning
    Srinivasan S.
    P D.
    Measurement: Sensors, 2023, 25
  • [49] Cyber Security for Medical Image Encryption using Circular Blockchain Technology Based on Modify DES Algorithm
    Jamil, Abeer Salim
    Rahma, Abdul Monem S.
    INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2023, 19 (03) : 99 - 112
  • [50] Roman Urdu Hate Speech Detection Using Transformer-Based Model for Cyber Security Applications
    Bilal, Muhammad
    Khan, Atif
    Jan, Salman
    Musa, Shahrulniza
    Ali, Shaukat
    SENSORS, 2023, 23 (08)