Evidence Theory Data Fusion-Based Method for Cyber-Attack Detection

被引:0
|
作者
Dallali, Adel [1 ]
Omrani, Takwa [2 ]
Rhaimi, Belgacem Chibani [2 ]
机构
[1] Univ Gafsa, Fac Sc, Gafsa 2100, Tunisia
[2] Univ Gabes, MACS, ENIG, Rue Omar Ibn Elkhattab, Gabes 6029, Tunisia
来源
2018 4TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SIGNAL AND IMAGE PROCESSING (ATSIP) | 2018年
关键词
Attack; Cybercrime; Dempster-Shafer theory; Data fusion;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Detecting electronic crimes is a big challenge as they are tainted with a large number of imperfections such as imprecision and uncertainty. For this reason, we must choose a perfect tool to detect cybercrime taking place in an uncertain environment. In this paper, we are proposing a high-level data fusion approach based on evidence theory (Dempster-Shafer theory) which aims at improving the reliability of cybercrimes detection process using a more improved decision consisting in merging complementary decisions from two independent classifiers, namely Support Vector Machine (SVM) and Artificial Neural network (ANN) in an uncertain environment. In fact, the retained approach is characterized by its capability to overcome the uncertain data nature.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Data Mining Based Cyber-Attack Detection
    TIANFIELD Huaglory
    系统仿真技术, 2017, 13 (02) : 90 - 104
  • [2] Cyber-attack group analysis method based on association of cyber-attack information
    Son, Kyung-ho
    Kim, Byung-ik
    Lee, Tae-jin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 260 - 280
  • [3] Fusion-Based FDI Attack Detection in Cyber-Physical Systems
    Gao, Lingjie
    Chen, Bo
    Yu, Li
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2020, 67 (08) : 1487 - 1491
  • [4] Data Fusion-Based Network Anomaly Detection towards Evidence Theory
    Cong Thanh Bui
    Van Loi Cao
    Minh Hoang
    Quang Uy Nguyen
    PROCEEDINGS OF 2019 6TH NATIONAL FOUNDATION FOR SCIENCE AND TECHNOLOGY DEVELOPMENT (NAFOSTED) CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2019, : 33 - 38
  • [5] A Data Preparation Method for Machine-Learning-Based Power System Cyber-Attack Detection
    Chen, Hongyu
    Wang, Jingyu
    Shi, Dongyuan
    2018 INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY (POWERCON), 2018, : 3003 - 3009
  • [6] Online transportation network cyber-attack detection based on stationary sensor data
    Sun, Ruixiao
    Luo, Qi
    Chen, Yuche
    TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES, 2023, 149
  • [7] Cyber-attack detection based on controlled invariant sets
    Rosich, Albert
    Voos, Holger
    Darouach, Mohamed
    2014 EUROPEAN CONTROL CONFERENCE (ECC), 2014, : 2176 - 2181
  • [8] A Cyber-Attack Detection Model Based on Multivariate Analyses
    Sakai, Yuto
    Rinsaka, Koichiro
    Dohi, Tadashi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (07) : 1585 - 1592
  • [9] The Future Roadmap for Cyber-attack Detection
    Soleymanzadeh, Raha
    Kashef, Rasha
    2022 6TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2022, 2022, : 66 - 70
  • [10] Controller Cyber-Attack Detection and Isolation
    Sztyber-Betley, Anna
    Syfert, Michal
    Koscielny, Jan Maciej
    Gorecka, Zuzanna
    SENSORS, 2023, 23 (05)