A detailed investigation and analysis of using machine learning techniques for intrusion detection

P Mishra, V Varadharajan… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
Intrusion detection is one of the important security problems in todays cyber world. A
significant number of techniques have been developed which are based on machine …

A taxonomy of botnet behavior, detection, and defense

S Khattak, NR Ramay, KR Khan… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
A number of detection and defense mechanisms have emerged in the last decade to tackle
the botnet phenomenon. It is important to organize this knowledge to better understand the …

Complex event processing for physical and cyber security in datacentres-recent progress, challenges and recommendations

KA Alaghbari, MHM Saad, A Hussain… - Journal of Cloud …, 2022 - Springer
A datacentre stores information and manages data access in fast and reliable manner.
Failure of datacentre operation is not an option and can be catastrophic. Internet of things …

DARLING: data-aware load shedding in complex event processing systems

K Chapnik, I Kolchinsky, A Schuster - Proceedings of the VLDB …, 2021 - dl.acm.org
Complex event processing (CEP) is widely employed to detect user-defined combinations,
or patterns, of events in massive streams of incoming data. Numerous applications such as …

An event-based platform for collaborative threats detection and monitoring

G Lodi, L Aniello, GA Di Luna, R Baldoni - Information Systems, 2014 - Elsevier
Organizations must protect their information systems from a variety of threats. Usually they
employ isolated defenses such as firewalls, intrusion detection and fraud monitoring …

On load shedding in complex event processing

Y He, S Barman, JF Naughton - arxiv preprint arxiv:1312.4283, 2013 - arxiv.org
Complex Event Processing (CEP) is a stream processing model that focuses on detecting
event patterns in continuous event streams. While the CEP model has gained popularity in …

A comparative study of correlation engines for security event management

L Rosa, P Alves, T Cruz, P Simões… - Iccws 2015-The …, 2015 - books.google.com
SIEM (Software Information and Event Management) systems are becoming increasingly
commonplace in scenarios as diverse as ICT environments or Critical infrastructures …

A collaborative event processing system for protection of critical infrastructures from cyber attacks

L Aniello, GA Di Luna, G Lodi, R Baldoni - International Conference on …, 2011 - Springer
We describe an Internet-based collaborative environment that protects geographically
dispersed organizations of a critical infrastructure (eg, financial institutions, telco providers) …

[PDF][PDF] A survey of anomaly detection techniques and hidden markov model

H Sukhwani, V Sharma, S Sharma - International Journal of Computer …, 2014 - Citeseer
ABSTRACT An Intrusion detection System is software that is used for the malicious activities
performed in the network whether in wired or in wireless. Although there are various …

[PDF][PDF] Employing the CEP paradigm for network analysis and surveillance

R Gad, M Kappes, J Boubeta-Puig, I Medina-Bulo - AICT 2013, 2013 - academia.edu
In this paper, we present a network analysis and surveillance system based on the Complex
Event Processing (CEP) paradigm. We demonstrate how complex event hierarchies based …