Preserving authentication and availability security services through Multivariate Statistical Network Monitoring
Tài liệu tham khảo
David, 2019
Khraisat, 2019, Survey of intrusion detection systems: techniques, datasets and challenges, Cybersecurity, 2, 1, 10.1186/s42400-019-0038-7
Louis, 2019
National Cryptologic Centre, 2019
Herrero, 2013, RT-MOVICAB-IDS: Addressing real-time intrusion detection, Future Gener Comput Syst, 29, 10.1016/j.future.2010.12.017
Kreibich, 2004, Honeycomb - Creating intrusion detection signatures using honeypots, Comput Commun Rev, 34, 51, 10.1145/972374.972384
Hubballi, 2014, False alarm minimization techniques in signature-based intrusion detection systems: A survey, Comput Commun, 49, 1, 10.1016/j.comcom.2014.04.012
Butun, 2014, A survey of intrusion detection systems in wireless sensor networks, IEEE Commun Surv Tutor, 16, 266, 10.1109/SURV.2013.050113.00191
Dutra, 2019, HIDS by signature for embedded devices in IoT networks
M.H. Bhuyan, 2014, Network anomaly detection: Methods, systems and tools, IEEE Commun Surv Tutor, 16, 303, 10.1109/SURV.2013.052213.00046
Camacho, 2016, PCA-based multivariate statistical network monitoring for anomaly detection, Comput Secur, 59, 118, 10.1016/j.cose.2016.02.008
Camacho, 2017, Traffic monitoring and diagnosis with multivariate statistical network monitoring: A case study, 241
Camacho, 2019, Semi-supervised multivariate statistical network monitoring for learning security threats, IEEE Trans Inf Forensics Secur, 1
Camacho, 2019, Multivariate big data analysis for intrusion detection: 5 steps from the haystack to the needle, Comput Secur, 87, 1, 10.1016/j.cose.2019.101603
Magán-Carrión, 2020, Multivariate statistical network monitoring–sensor: An effective tool for real-time monitoring and anomaly detection in complex networks and systems, Int J Distrib Sens Netw, 16, 10.1177/1550147720921309
Magán-Carrión, 2020, Towards a reliable comparison and evaluation of network intrusion detection systems based on machine learning approaches, Appl Sci, 10, 1775, 10.3390/app10051775
Sharafaldin, 2018, Toward generating a new intrusion detection dataset and intrusion traffic characterization, 108
West, 2009, Chapter 3 - Preventing system intrusions, 39
Zong, 2020, Interactive three-dimensional visualization of network intrusion detection data for machine learning, Future Gener Comput Syst, 102, 292, 10.1016/j.future.2019.07.045
Moustafa, 2018, A holistic review of network anomaly detection systems: A comprehensive survey, J Netw Comput Appl, 128
Lakhina, 2004, Diagnosing network-wide traffic anomalies, 219
Paffenroth, 2018
Ringberg, 2007, Sensitivity of PCA for traffic anomaly detection, 35, 109
Xia, 2010, Intrusion detection system based on principal component analysis and grey neural networks, 2, 135
Ibrahimi, 2017, 1
Abdulhammed, 2019, Features dimensionality reduction approaches for machine learning based network intrusion detection, Electronics, 8, 322, 10.3390/electronics8030322
George, 2012, Anomaly detection based on machine learning dimensionality reduction using PCA and classification using SVM, Int J Comput Appl, 47, 5
Xu, 2005, 696
Miler, 2012, PCA sensitivity: The role of representative and outlier strides in gait sequence, 123
Sperotto, 2010, An overview of IP flow-based intrusion detection, IEEE Commun Surv Tutor, 12, 343, 10.1109/SURV.2010.032210.00054
Stiawan, 2019, Investigating brute force attack patterns in IoT network, J Electr Comput Eng, 1
Hofstede, 2017, Flow-based web application brute-force attack and compromise detection, J Netw Syst Manage, 10.1007/s10922-017-9421-4
Hellemons, 2012
Satoh, 2012, SSH dictionary attack detection based on flow analysis, 51
Amin, 2009, 31
Yuan, 2013, Resilient control of cyber-physical systems against denial-of-service attacks, 54
Gao, 2019, Research about dos attack against ICPS, Sensors, 19, 1542, 10.3390/s19071542
Sridaran, 2014
Galeano-Brajones, 2020, Detection and mitigation of DoS and DDoS attacks in IoT-based stateful SDN: An experimental approach, Sensors (14248220), 20, 816, 10.3390/s20030816
Baig, 2020, Averaged dependence estimators for dos attack detection in IoT networks, Future Gener Comput Syst, 102, 198, 10.1016/j.future.2019.08.007
Xiao, 2016, A protocol-free detection against cloud oriented reflection dos attacks, Soft Comput, 21
Daneshgadeh Çakmakçı, 2020, Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm, J Netw Comput Appl, 168, 10.1016/j.jnca.2020.102756
Azwar, 2018, Intrusion detection in secure network for cybersecurity systems using machine learning and data mining, 1
Ahmim, 2019, A novel hierarchical intrusion detection system based on decision tree and rules-based models, 228
Hindy, 2020
Magán-Carrión, 2015, Multivariate statistical approach for anomaly detection and lost data recovery in wireless sensor networks, Int J Distrib Sens Netw, 11, 1, 10.1155/2015/672124
Jackson, 1979, Control procedures for residuals associated with principal component analysis, Technometrics, 21, 341, 10.1080/00401706.1979.10489779
Hotelling, 1947
Nomikos, 1995, Multivariate SPC charts for monitoring batch processes, Technometrics, 37, 41, 10.1080/00401706.1995.10485888
Magán-Carrión, 2019
Mary, 2014, Secure cloud computing environment against DDOS and EDOS attacks, Int J Comput Sci Inf Technol (IJCSIT), 5, 1803
Sail, 2017, SAAS cloud security: Attacks and proposed solutions, Trans Mach Learn Artif Intell, 5, 291