A Fuzzy Logic Approach for Effective Prioritization of Network Intrusion Alerts

A Fuzzy Logic Approach for Effective Prioritization of Network Intrusion Alerts PDF Author: E. Allison Newcomb
Publisher:
ISBN:
Category :
Languages : en
Pages : 155

Get Book Here

Book Description
Advances in information technology have transformed many aspects of how humans operate in today's world. We rely heavily on computer, information and communications networks for everything from entertainment and education, and from shopping to national defense. It is therefore critical that our networks and information are protected to ensure their availability and integrity. If one considers the omnipresent nature of information technology and its many users, it is easy to imagine that tremendous amounts of data are generated every minute of every day, all around the world. The volume, variety, velocity and veracity of that data complicate efforts to protect it and the networks used for its creation and transmission. Defending computer networks against infiltrations is a complex task. Intrusion detection systems alert analysts to activity that breaches security policy, but the alerts must be investigated to determine whether the activity was benign, suspicious or malicious. The attack surface is vast, the network components are heterogeneous, and the wide array of software applications complicate the analyst's investigation. Experience has shown that decreasing the time between an alert firing and starting an investigation (lag time) is essential to improving the security of the network. This dissertation addresses the issue of shortening the lag time through the implementation of a fuzzy logic construct, the novel use of a military targeting methodology, and a related business process improvement. As part of this dissertation, models were developed and simulations executed to validate the efficacy of the fuzzy logic construct. The research then extended the fuzzy logic construct from the domain of military intelligence analysis to the cyber security domain. Experiments using datasets from cyber defense competitions were performed to validate the successful extension and implementation of the fuzzy logic construct. The interpretation of the results from this research indicate that the method of identifying network critical assets and the resulting fuzzy logic rules significantly decrease lag time. These results also show that the increased granularity in the fuzzy logic rules leads to greater understanding of the network environments for which the computer and information security staff are responsible.

Soft Computing in Data Analytics

Soft Computing in Data Analytics PDF Author: Janmenjoy Nayak
Publisher: Springer
ISBN: 9811305145
Category : Technology & Engineering
Languages : en
Pages : 848

Get Book Here

Book Description
The volume contains original research findings, exchange of ideas and dissemination of innovative, practical development experiences in different fields of soft and advance computing. It provides insights into the International Conference on Soft Computing in Data Analytics (SCDA). It also concentrates on both theory and practices from around the world in all the areas of related disciplines of soft computing. The book provides rapid dissemination of important results in soft computing technologies, a fusion of research in fuzzy logic, evolutionary computations, neural science and neural network systems and chaos theory and chaotic systems, swarm based algorithms, etc. The book aims to cater the postgraduate students and researchers working in the discipline of computer science and engineering along with other engineering branches.

Cyber Security Using Modern Technologies

Cyber Security Using Modern Technologies PDF Author: Om Pal
Publisher: CRC Press
ISBN: 1000908062
Category : Computers
Languages : en
Pages : 351

Get Book Here

Book Description
The main objective of this book is to introduce cyber security using modern technologies such as Artificial Intelligence, Quantum Cryptography, and Blockchain. This book provides in-depth coverage of important concepts related to cyber security. Beginning with an introduction to Quantum Computing, Post-Quantum Digital Signatures, and Artificial Intelligence for cyber security of modern networks and covering various cyber-attacks and the defense measures, strategies, and techniques that need to be followed to combat them, this book goes on to explore several crucial topics, such as security of advanced metering infrastructure in smart grids, key management protocols, network forensics, intrusion detection using machine learning, cloud computing security risk assessment models and frameworks, cyber-physical energy systems security, a biometric random key generator using deep neural network and encrypted network traffic classification. In addition, this book provides new techniques to handle modern threats with more intelligence. It also includes some modern techniques for cyber security, such as blockchain for modern security, quantum cryptography, and forensic tools. Also, it provides a comprehensive survey of cutting-edge research on the cyber security of modern networks, giving the reader a general overview of the field. It also provides interdisciplinary solutions to protect modern networks from any type of attack or manipulation. The new protocols discussed in this book thoroughly examine the constraints of networks, including computation, communication, and storage cost constraints, and verifies the protocols both theoretically and experimentally. Written in a clear and comprehensive manner, this book would prove extremely helpful to readers. This unique and comprehensive solution for the cyber security of modern networks will greatly benefit researchers, graduate students, and engineers in the fields of cryptography and network security.

Annual Meeting of the North American Fuzzy Information Processing Society--NAFIPS.

Annual Meeting of the North American Fuzzy Information Processing Society--NAFIPS. PDF Author: North American Fuzzy Information Processing Society. Annual Meeting
Publisher:
ISBN:
Category : Fuzzy systems
Languages : en
Pages : 850

Get Book Here

Book Description


Fuzzy Multi-Criteria Decision Making

Fuzzy Multi-Criteria Decision Making PDF Author: Cengiz Kahraman
Publisher: Springer Science & Business Media
ISBN: 0387768130
Category : Computers
Languages : en
Pages : 591

Get Book Here

Book Description
This work examines all the fuzzy multicriteria methods recently developed, such as fuzzy AHP, fuzzy TOPSIS, interactive fuzzy multiobjective stochastic linear programming, fuzzy multiobjective dynamic programming, grey fuzzy multiobjective optimization, fuzzy multiobjective geometric programming, and more. Each of the 22 chapters includes practical applications along with new developments/results. This book may be used as a textbook in graduate operations research, industrial engineering, and economics courses. It will also be an excellent resource, providing new suggestions and directions for further research, for computer programmers, mathematicians, and scientists in a variety of disciplines where multicriteria decision making is needed.

Machine Learning in Intrusion Detection

Machine Learning in Intrusion Detection PDF Author: Yihua Liao
Publisher:
ISBN:
Category :
Languages : en
Pages : 230

Get Book Here

Book Description
Detection of anomalies in data is one of the fundamental machine learning tasks. Anomaly detection provides the core technology for a broad spectrum of security-centric applications. In this dissertation, we examine various aspects of anomaly based intrusion detection in computer security. First, we present a new approach to learn program behavior for intrusion detection. Text categorization techniques are adopted to convert each process to a vector and calculate the similarity between two program activities. Then the k-nearest neighbor classifier is employed to classify program behavior as normal or intrusive. We demonstrate that our approach is able to effectively detect intrusive program behavior while a low false positive rate is achieved. Second, we describe an adaptive anomaly detection framework that is de- signed to handle concept drift and online learning for dynamic, changing environments. Through the use of unsupervised evolving connectionist systems, normal behavior changes are efficiently accommodated while anomalous activities can still be recognized. We demonstrate the performance of our adaptive anomaly detection systems and show that the false positive rate can be significantly reduced.

Recent Developments in Data Science and Business Analytics

Recent Developments in Data Science and Business Analytics PDF Author: Madjid Tavana
Publisher: Springer
ISBN: 3319727451
Category : Business & Economics
Languages : en
Pages : 494

Get Book Here

Book Description
This edited volume is brought out from the contributions of the research papers presented in the International Conference on Data Science and Business Analytics (ICDSBA- 2017), which was held during September 23-25 2017 in ChangSha, China. As we all know, the field of data science and business analytics is emerging at the intersection of the fields of mathematics, statistics, operations research, information systems, computer science and engineering. Data science and business analytics is an interdisciplinary field about processes and systems to extract knowledge or insights from data. Data science and business analytics employ techniques and theories drawn from many fields including signal processing, probability models, machine learning, statistical learning, data mining, database, data engineering, pattern recognition, visualization, descriptive analytics, predictive analytics, prescriptive analytics, uncertainty modeling, big data, data warehousing, data compression, computer programming, business intelligence, computational intelligence, and high performance computing among others. The volume contains 55 contributions from diverse areas of Data Science and Business Analytics, which has been categorized into five sections, namely: i) Marketing and Supply Chain Analytics; ii) Logistics and Operations Analytics; iii) Financial Analytics. iv) Predictive Modeling and Data Analytics; v) Communications and Information Systems Analytics. The readers shall not only receive the theoretical knowledge about this upcoming area but also cutting edge applications of this domains.

Advances in Big Data and Cloud Computing

Advances in Big Data and Cloud Computing PDF Author: Elijah Blessing Rajsingh
Publisher: Springer
ISBN: 9811072000
Category : Technology & Engineering
Languages : en
Pages : 402

Get Book Here

Book Description
This book is a compendium of the proceedings of the International Conference on Big-Data and Cloud Computing. It includes recent advances in the areas of big data analytics, cloud computing, the Internet of nano things, cloud security, data analytics in the cloud, smart cities and grids, etc. Primarily focusing on the application of knowledge that promotes ideas for solving the problems of the society through cutting-edge technologies, it provides novel ideas that further world-class research and development. This concise compilation of articles approved by a panel of expert reviewers is an invaluable resource for researchers in the area of advanced engineering sciences.

Future Intent-Based Networking

Future Intent-Based Networking PDF Author: Mikhailo Klymash
Publisher: Springer Nature
ISBN: 3030924351
Category : Technology & Engineering
Languages : en
Pages : 531

Get Book Here

Book Description
So-called Intent-Based Networking (IBN) is founded on well-known SDN (Software-Defined Networking) and represents one of the most important emerging network infrastructure opportunities. The IBN is the beginning of a new era in the history of networking, where the network itself translates business intentions into appropriate network configurations for all devices. This minimizes manual effort, provides an additional layer of network monitoring, and provides the ability to perform network analytics and take full advantage of machine learning. The centralized, software-defined solution provides process automation and proactive problem solving as well as centralized management of the network infrastructure. With software-based network management, many operations can be performed automatically using intelligent control algorithms (artificial intelligence and machine learning). As a result, network operation costs, application response times and energy consumption are reduced, network reliability and performance are improved, network security and flexibility are enhanced. This will be a benefit for existing networks as well as evolved LTE-based mobile networks, emerging Internet of Things (IoT), Cloud systems, and soon for the future 5G/6G networks. The future networks will reach a whole new level of self-awareness, self-configuration, self-optimization, self-recovery and self-protection. This volume consists of 28 chapters, based on recent research on IBN.The volume is a collection of the most important research for the future intent-based networking deployment provided by different groups of researchers from Ukraine, Germany, Slovak Republic, Switzerland, South Korea, China, Czech Republic, Poland, Brazil, Belarus and Israel. The authors of the chapters from this collection present in depth extended research results in their scientific fields.The presented contents are highly interesting while still being rather practically oriented and straightforward to understand. Herewith we would like to wish all our readers a lot of inspiration by studying of the volume!

Intelligent and Fuzzy Techniques for Emerging Conditions and Digital Transformation

Intelligent and Fuzzy Techniques for Emerging Conditions and Digital Transformation PDF Author: Cengiz Kahraman
Publisher: Springer Nature
ISBN: 3030856267
Category : Technology & Engineering
Languages : en
Pages : 954

Get Book Here

Book Description
This book presents recent research in intelligent and fuzzy techniques. Emerging conditions such as pandemic, wars, natural disasters and various high technologies force people for significant changes in business and social life. The adoption of digital technologies to transform services or businesses, through replacing non-digital or manual processes with digital processes or replacing older digital technology with newer digital technologies through intelligent systems is the main scope of this book. It focuses on revealing the reflection of digital transformation in our business and social life under emerging conditions through intelligent and fuzzy systems. The latest intelligent and fuzzy methods and techniques on digital transformation are introduced by theory and applications. The intended readers are intelligent and fuzzy systems researchers, lecturers, M.Sc. and Ph.D. students studying digital transformation. Usage of ordinary fuzzy sets and their extensions, heuristics and metaheuristics from optimization to machine learning, from quality management to risk management makes the book an excellent source for researchers.