A detailed investigation and analysis of using machine learning techniques for intrusion detection
P Mishra, V Varadharajan… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
Intrusion detection is one of the important security problems in todays cyber world. A
significant number of techniques have been developed which are based on machine …
significant number of techniques have been developed which are based on machine …
A taxonomy of botnet behavior, detection, and defense
S Khattak, NR Ramay, KR Khan… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
A number of detection and defense mechanisms have emerged in the last decade to tackle
the botnet phenomenon. It is important to organize this knowledge to better understand the …
the botnet phenomenon. It is important to organize this knowledge to better understand the …
Complex event processing for physical and cyber security in datacentres-recent progress, challenges and recommendations
KA Alaghbari, MHM Saad, A Hussain… - Journal of Cloud …, 2022 - Springer
A datacentre stores information and manages data access in fast and reliable manner.
Failure of datacentre operation is not an option and can be catastrophic. Internet of things …
Failure of datacentre operation is not an option and can be catastrophic. Internet of things …
DARLING: data-aware load shedding in complex event processing systems
K Chapnik, I Kolchinsky, A Schuster - Proceedings of the VLDB …, 2021 - dl.acm.org
Complex event processing (CEP) is widely employed to detect user-defined combinations,
or patterns, of events in massive streams of incoming data. Numerous applications such as …
or patterns, of events in massive streams of incoming data. Numerous applications such as …
An event-based platform for collaborative threats detection and monitoring
Organizations must protect their information systems from a variety of threats. Usually they
employ isolated defenses such as firewalls, intrusion detection and fraud monitoring …
employ isolated defenses such as firewalls, intrusion detection and fraud monitoring …
On load shedding in complex event processing
Complex Event Processing (CEP) is a stream processing model that focuses on detecting
event patterns in continuous event streams. While the CEP model has gained popularity in …
event patterns in continuous event streams. While the CEP model has gained popularity in …
A comparative study of correlation engines for security event management
SIEM (Software Information and Event Management) systems are becoming increasingly
commonplace in scenarios as diverse as ICT environments or Critical infrastructures …
commonplace in scenarios as diverse as ICT environments or Critical infrastructures …
A collaborative event processing system for protection of critical infrastructures from cyber attacks
We describe an Internet-based collaborative environment that protects geographically
dispersed organizations of a critical infrastructure (eg, financial institutions, telco providers) …
dispersed organizations of a critical infrastructure (eg, financial institutions, telco providers) …
[PDF][PDF] A survey of anomaly detection techniques and hidden markov model
H Sukhwani, V Sharma, S Sharma - International Journal of Computer …, 2014 - Citeseer
ABSTRACT An Intrusion detection System is software that is used for the malicious activities
performed in the network whether in wired or in wireless. Although there are various …
performed in the network whether in wired or in wireless. Although there are various …
[PDF][PDF] Employing the CEP paradigm for network analysis and surveillance
In this paper, we present a network analysis and surveillance system based on the Complex
Event Processing (CEP) paradigm. We demonstrate how complex event hierarchies based …
Event Processing (CEP) paradigm. We demonstrate how complex event hierarchies based …