A Fuzzy Logic Approach for Effective Prioritization of Network Intrusion Alerts

A Fuzzy Logic Approach for Effective Prioritization of Network Intrusion Alerts

Author: E. Allison Newcomb

Publisher:

Published: 2017

Total Pages: 155

ISBN-13:

DOWNLOAD EBOOK

Advances in information technology have transformed many aspects of how humans operate in today's world. We rely heavily on computer, information and communications networks for everything from entertainment and education, and from shopping to national defense. It is therefore critical that our networks and information are protected to ensure their availability and integrity. If one considers the omnipresent nature of information technology and its many users, it is easy to imagine that tremendous amounts of data are generated every minute of every day, all around the world. The volume, variety, velocity and veracity of that data complicate efforts to protect it and the networks used for its creation and transmission. Defending computer networks against infiltrations is a complex task. Intrusion detection systems alert analysts to activity that breaches security policy, but the alerts must be investigated to determine whether the activity was benign, suspicious or malicious. The attack surface is vast, the network components are heterogeneous, and the wide array of software applications complicate the analyst's investigation. Experience has shown that decreasing the time between an alert firing and starting an investigation (lag time) is essential to improving the security of the network. This dissertation addresses the issue of shortening the lag time through the implementation of a fuzzy logic construct, the novel use of a military targeting methodology, and a related business process improvement. As part of this dissertation, models were developed and simulations executed to validate the efficacy of the fuzzy logic construct. The research then extended the fuzzy logic construct from the domain of military intelligence analysis to the cyber security domain. Experiments using datasets from cyber defense competitions were performed to validate the successful extension and implementation of the fuzzy logic construct. The interpretation of the results from this research indicate that the method of identifying network critical assets and the resulting fuzzy logic rules significantly decrease lag time. These results also show that the increased granularity in the fuzzy logic rules leads to greater understanding of the network environments for which the computer and information security staff are responsible.


A Fuzzy-logic Based Alert Prioritization Engine for IDSs

A Fuzzy-logic Based Alert Prioritization Engine for IDSs

Author: Khalid Ateatallah Alsubhi

Publisher:

Published: 2008

Total Pages: 64

ISBN-13: 9780494435793

DOWNLOAD EBOOK

Intrusion Detection Systems (IDSs) are designed to monitor a networked environment and generate alerts whenever abnormal activities are detected. The number of these alerts can be very large making their evaluation by security analysts a difficult task. The management is complicated by the need to configure the different components of alert evaluation systems. In addition, IDS alert management techniques, such as clustering and correlation, suffer from involving unrelated alerts in their processes and consequently provide results that are inaccurate and difficult to manage. Thus, the tuning of an IDS alert management system in order to provide optimal results remains a major challenge, which is further complicated by the large spectrum of potential attacks the system can be subject to. This thesis considers the specification and configuration issues of FuzMet, a novel IDS alert management system which employs several metrics and a fuzzy-logic based approach for scoring and prioritizing alerts. In addition, it features an alert rescoring technique that leads to a further reduction of the number of alerts. We study the impact of different configurations of the proposed metrics on the accuracy and completeness of the alert scores generated by FuzMet.


Soft Computing in Data Analytics

Soft Computing in Data Analytics

Author: Janmenjoy Nayak

Publisher: Springer

Published: 2018-08-21

Total Pages: 848

ISBN-13: 9811305145

DOWNLOAD EBOOK

The volume contains original research findings, exchange of ideas and dissemination of innovative, practical development experiences in different fields of soft and advance computing. It provides insights into the International Conference on Soft Computing in Data Analytics (SCDA). It also concentrates on both theory and practices from around the world in all the areas of related disciplines of soft computing. The book provides rapid dissemination of important results in soft computing technologies, a fusion of research in fuzzy logic, evolutionary computations, neural science and neural network systems and chaos theory and chaotic systems, swarm based algorithms, etc. The book aims to cater the postgraduate students and researchers working in the discipline of computer science and engineering along with other engineering branches.


Cyber Security Using Modern Technologies

Cyber Security Using Modern Technologies

Author: Om Pal

Publisher: CRC Press

Published: 2023-08-02

Total Pages: 351

ISBN-13: 1000908062

DOWNLOAD EBOOK

The main objective of this book is to introduce cyber security using modern technologies such as Artificial Intelligence, Quantum Cryptography, and Blockchain. This book provides in-depth coverage of important concepts related to cyber security. Beginning with an introduction to Quantum Computing, Post-Quantum Digital Signatures, and Artificial Intelligence for cyber security of modern networks and covering various cyber-attacks and the defense measures, strategies, and techniques that need to be followed to combat them, this book goes on to explore several crucial topics, such as security of advanced metering infrastructure in smart grids, key management protocols, network forensics, intrusion detection using machine learning, cloud computing security risk assessment models and frameworks, cyber-physical energy systems security, a biometric random key generator using deep neural network and encrypted network traffic classification. In addition, this book provides new techniques to handle modern threats with more intelligence. It also includes some modern techniques for cyber security, such as blockchain for modern security, quantum cryptography, and forensic tools. Also, it provides a comprehensive survey of cutting-edge research on the cyber security of modern networks, giving the reader a general overview of the field. It also provides interdisciplinary solutions to protect modern networks from any type of attack or manipulation. The new protocols discussed in this book thoroughly examine the constraints of networks, including computation, communication, and storage cost constraints, and verifies the protocols both theoretically and experimentally. Written in a clear and comprehensive manner, this book would prove extremely helpful to readers. This unique and comprehensive solution for the cyber security of modern networks will greatly benefit researchers, graduate students, and engineers in the fields of cryptography and network security.


Fuzzy Multi-Criteria Decision Making

Fuzzy Multi-Criteria Decision Making

Author: Cengiz Kahraman

Publisher: Springer Science & Business Media

Published: 2008-08-09

Total Pages: 591

ISBN-13: 0387768130

DOWNLOAD EBOOK

This work examines all the fuzzy multicriteria methods recently developed, such as fuzzy AHP, fuzzy TOPSIS, interactive fuzzy multiobjective stochastic linear programming, fuzzy multiobjective dynamic programming, grey fuzzy multiobjective optimization, fuzzy multiobjective geometric programming, and more. Each of the 22 chapters includes practical applications along with new developments/results. This book may be used as a textbook in graduate operations research, industrial engineering, and economics courses. It will also be an excellent resource, providing new suggestions and directions for further research, for computer programmers, mathematicians, and scientists in a variety of disciplines where multicriteria decision making is needed.


Recent Developments in Data Science and Business Analytics

Recent Developments in Data Science and Business Analytics

Author: Madjid Tavana

Publisher: Springer

Published: 2018-03-27

Total Pages: 494

ISBN-13: 3319727451

DOWNLOAD EBOOK

This edited volume is brought out from the contributions of the research papers presented in the International Conference on Data Science and Business Analytics (ICDSBA- 2017), which was held during September 23-25 2017 in ChangSha, China. As we all know, the field of data science and business analytics is emerging at the intersection of the fields of mathematics, statistics, operations research, information systems, computer science and engineering. Data science and business analytics is an interdisciplinary field about processes and systems to extract knowledge or insights from data. Data science and business analytics employ techniques and theories drawn from many fields including signal processing, probability models, machine learning, statistical learning, data mining, database, data engineering, pattern recognition, visualization, descriptive analytics, predictive analytics, prescriptive analytics, uncertainty modeling, big data, data warehousing, data compression, computer programming, business intelligence, computational intelligence, and high performance computing among others. The volume contains 55 contributions from diverse areas of Data Science and Business Analytics, which has been categorized into five sections, namely: i) Marketing and Supply Chain Analytics; ii) Logistics and Operations Analytics; iii) Financial Analytics. iv) Predictive Modeling and Data Analytics; v) Communications and Information Systems Analytics. The readers shall not only receive the theoretical knowledge about this upcoming area but also cutting edge applications of this domains.


Advances in Big Data and Cloud Computing

Advances in Big Data and Cloud Computing

Author: Elijah Blessing Rajsingh

Publisher: Springer

Published: 2018-04-06

Total Pages: 402

ISBN-13: 9811072000

DOWNLOAD EBOOK

This book is a compendium of the proceedings of the International Conference on Big-Data and Cloud Computing. It includes recent advances in the areas of big data analytics, cloud computing, the Internet of nano things, cloud security, data analytics in the cloud, smart cities and grids, etc. Primarily focusing on the application of knowledge that promotes ideas for solving the problems of the society through cutting-edge technologies, it provides novel ideas that further world-class research and development. This concise compilation of articles approved by a panel of expert reviewers is an invaluable resource for researchers in the area of advanced engineering sciences.


Machine Learning in Intrusion Detection

Machine Learning in Intrusion Detection

Author: Yihua Liao

Publisher:

Published: 2005

Total Pages: 230

ISBN-13:

DOWNLOAD EBOOK

Detection of anomalies in data is one of the fundamental machine learning tasks. Anomaly detection provides the core technology for a broad spectrum of security-centric applications. In this dissertation, we examine various aspects of anomaly based intrusion detection in computer security. First, we present a new approach to learn program behavior for intrusion detection. Text categorization techniques are adopted to convert each process to a vector and calculate the similarity between two program activities. Then the k-nearest neighbor classifier is employed to classify program behavior as normal or intrusive. We demonstrate that our approach is able to effectively detect intrusive program behavior while a low false positive rate is achieved. Second, we describe an adaptive anomaly detection framework that is de- signed to handle concept drift and online learning for dynamic, changing environments. Through the use of unsupervised evolving connectionist systems, normal behavior changes are efficiently accommodated while anomalous activities can still be recognized. We demonstrate the performance of our adaptive anomaly detection systems and show that the false positive rate can be significantly reduced.


Future Intent-Based Networking

Future Intent-Based Networking

Author: Mikhailo Klymash

Publisher: Springer Nature

Published: 2021-12-09

Total Pages: 531

ISBN-13: 3030924351

DOWNLOAD EBOOK

So-called Intent-Based Networking (IBN) is founded on well-known SDN (Software-Defined Networking) and represents one of the most important emerging network infrastructure opportunities. The IBN is the beginning of a new era in the history of networking, where the network itself translates business intentions into appropriate network configurations for all devices. This minimizes manual effort, provides an additional layer of network monitoring, and provides the ability to perform network analytics and take full advantage of machine learning. The centralized, software-defined solution provides process automation and proactive problem solving as well as centralized management of the network infrastructure. With software-based network management, many operations can be performed automatically using intelligent control algorithms (artificial intelligence and machine learning). As a result, network operation costs, application response times and energy consumption are reduced, network reliability and performance are improved, network security and flexibility are enhanced. This will be a benefit for existing networks as well as evolved LTE-based mobile networks, emerging Internet of Things (IoT), Cloud systems, and soon for the future 5G/6G networks. The future networks will reach a whole new level of self-awareness, self-configuration, self-optimization, self-recovery and self-protection. This volume consists of 28 chapters, based on recent research on IBN.The volume is a collection of the most important research for the future intent-based networking deployment provided by different groups of researchers from Ukraine, Germany, Slovak Republic, Switzerland, South Korea, China, Czech Republic, Poland, Brazil, Belarus and Israel. The authors of the chapters from this collection present in depth extended research results in their scientific fields.The presented contents are highly interesting while still being rather practically oriented and straightforward to understand. Herewith we would like to wish all our readers a lot of inspiration by studying of the volume!