Preserving authentication and availability security services through Multivariate Statistical Network Monitoring

Journal of Information Security and Applications - Tập 58 - Trang 102785 - 2021
Sail Soufiane1, Roberto Magán-Carrión2, Inmaculada Medina-Bulo3, Halima Bouden4
1Dpt. of Computer Science (Faculty of Science), University AbdelMalek Essaadi, Tétouan, Morocco
2Network Engineering & Security Group, Dpt. of Signal Theory, Telematics & Communications, University of Granada, Granada, Spain
3Dpt. of Computer Science & Engineering, University of Cádiz, Cádiz, Spain
4Dpt. Statistics and IT department applied to management (Faculty of Law, Economic and Social Sciences), University AbdelMalek Essaadi, Tétouan, Morocco

Tài liệu tham khảo

David, 2019 Khraisat, 2019, Survey of intrusion detection systems: techniques, datasets and challenges, Cybersecurity, 2, 1, 10.1186/s42400-019-0038-7 Louis, 2019 National Cryptologic Centre, 2019 Herrero, 2013, RT-MOVICAB-IDS: Addressing real-time intrusion detection, Future Gener Comput Syst, 29, 10.1016/j.future.2010.12.017 Kreibich, 2004, Honeycomb - Creating intrusion detection signatures using honeypots, Comput Commun Rev, 34, 51, 10.1145/972374.972384 Hubballi, 2014, False alarm minimization techniques in signature-based intrusion detection systems: A survey, Comput Commun, 49, 1, 10.1016/j.comcom.2014.04.012 Butun, 2014, A survey of intrusion detection systems in wireless sensor networks, IEEE Commun Surv Tutor, 16, 266, 10.1109/SURV.2013.050113.00191 Dutra, 2019, HIDS by signature for embedded devices in IoT networks M.H. Bhuyan, 2014, Network anomaly detection: Methods, systems and tools, IEEE Commun Surv Tutor, 16, 303, 10.1109/SURV.2013.052213.00046 Camacho, 2016, PCA-based multivariate statistical network monitoring for anomaly detection, Comput Secur, 59, 118, 10.1016/j.cose.2016.02.008 Camacho, 2017, Traffic monitoring and diagnosis with multivariate statistical network monitoring: A case study, 241 Camacho, 2019, Semi-supervised multivariate statistical network monitoring for learning security threats, IEEE Trans Inf Forensics Secur, 1 Camacho, 2019, Multivariate big data analysis for intrusion detection: 5 steps from the haystack to the needle, Comput Secur, 87, 1, 10.1016/j.cose.2019.101603 Magán-Carrión, 2020, Multivariate statistical network monitoring–sensor: An effective tool for real-time monitoring and anomaly detection in complex networks and systems, Int J Distrib Sens Netw, 16, 10.1177/1550147720921309 Magán-Carrión, 2020, Towards a reliable comparison and evaluation of network intrusion detection systems based on machine learning approaches, Appl Sci, 10, 1775, 10.3390/app10051775 Sharafaldin, 2018, Toward generating a new intrusion detection dataset and intrusion traffic characterization, 108 West, 2009, Chapter 3 - Preventing system intrusions, 39 Zong, 2020, Interactive three-dimensional visualization of network intrusion detection data for machine learning, Future Gener Comput Syst, 102, 292, 10.1016/j.future.2019.07.045 Moustafa, 2018, A holistic review of network anomaly detection systems: A comprehensive survey, J Netw Comput Appl, 128 Lakhina, 2004, Diagnosing network-wide traffic anomalies, 219 Paffenroth, 2018 Ringberg, 2007, Sensitivity of PCA for traffic anomaly detection, 35, 109 Xia, 2010, Intrusion detection system based on principal component analysis and grey neural networks, 2, 135 Ibrahimi, 2017, 1 Abdulhammed, 2019, Features dimensionality reduction approaches for machine learning based network intrusion detection, Electronics, 8, 322, 10.3390/electronics8030322 George, 2012, Anomaly detection based on machine learning dimensionality reduction using PCA and classification using SVM, Int J Comput Appl, 47, 5 Xu, 2005, 696 Miler, 2012, PCA sensitivity: The role of representative and outlier strides in gait sequence, 123 Sperotto, 2010, An overview of IP flow-based intrusion detection, IEEE Commun Surv Tutor, 12, 343, 10.1109/SURV.2010.032210.00054 Stiawan, 2019, Investigating brute force attack patterns in IoT network, J Electr Comput Eng, 1 Hofstede, 2017, Flow-based web application brute-force attack and compromise detection, J Netw Syst Manage, 10.1007/s10922-017-9421-4 Hellemons, 2012 Satoh, 2012, SSH dictionary attack detection based on flow analysis, 51 Amin, 2009, 31 Yuan, 2013, Resilient control of cyber-physical systems against denial-of-service attacks, 54 Gao, 2019, Research about dos attack against ICPS, Sensors, 19, 1542, 10.3390/s19071542 Sridaran, 2014 Galeano-Brajones, 2020, Detection and mitigation of DoS and DDoS attacks in IoT-based stateful SDN: An experimental approach, Sensors (14248220), 20, 816, 10.3390/s20030816 Baig, 2020, Averaged dependence estimators for dos attack detection in IoT networks, Future Gener Comput Syst, 102, 198, 10.1016/j.future.2019.08.007 Xiao, 2016, A protocol-free detection against cloud oriented reflection dos attacks, Soft Comput, 21 Daneshgadeh Çakmakçı, 2020, Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm, J Netw Comput Appl, 168, 10.1016/j.jnca.2020.102756 Azwar, 2018, Intrusion detection in secure network for cybersecurity systems using machine learning and data mining, 1 Ahmim, 2019, A novel hierarchical intrusion detection system based on decision tree and rules-based models, 228 Hindy, 2020 Magán-Carrión, 2015, Multivariate statistical approach for anomaly detection and lost data recovery in wireless sensor networks, Int J Distrib Sens Netw, 11, 1, 10.1155/2015/672124 Jackson, 1979, Control procedures for residuals associated with principal component analysis, Technometrics, 21, 341, 10.1080/00401706.1979.10489779 Hotelling, 1947 Nomikos, 1995, Multivariate SPC charts for monitoring batch processes, Technometrics, 37, 41, 10.1080/00401706.1995.10485888 Magán-Carrión, 2019 Mary, 2014, Secure cloud computing environment against DDOS and EDOS attacks, Int J Comput Sci Inf Technol (IJCSIT), 5, 1803 Sail, 2017, SAAS cloud security: Attacks and proposed solutions, Trans Mach Learn Artif Intell, 5, 291