16th International Conference on Advanced Communication Technology 2014
DOI: 10.1109/icact.2014.6778962
|View full text |Cite
|
Sign up to set email alerts
|

Big data analysis system concept for detecting unknown attacks

Abstract: Abstract-Recently, threat of previously unknown cyber-attacks are increasing because existing security systems are not able to detect them. Past cyber-attacks had simple purposes of leaking personal information by attacking the PC or destroying the system. However, the goal of recent hacking attacks has changed from leaking information and destruction of services to attacking large-scale systems such as critical infrastructures and state agencies. In the other words, existing defence technologies to counter th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(19 citation statements)
references
References 1 publication
0
19
0
Order By: Relevance
“…Ahn et al [158] present a model for detecting future unknown Advanced Persistent Threats (APTs) attacks based on analysis of data gathered from various sources. The proposed model consists of four steps: (1) Data collection: data is collected from most of the available resources that includes log files, database, network behaviour, anti-virus, and status information (2) Data processing: collected data is processed to make it meet certain requirements (format and compatibility) (3) Data Analysis: processed data is analysed using clustering, predictions, and behavioural analysis to find out about user behaviour, system status, network traffic and misuse of files (4) Result: if any abnormal behaviour is detected, administrator is alerted about it.…”
Section: Network + Host-based Anomaly Detectionmentioning
confidence: 99%
“…Ahn et al [158] present a model for detecting future unknown Advanced Persistent Threats (APTs) attacks based on analysis of data gathered from various sources. The proposed model consists of four steps: (1) Data collection: data is collected from most of the available resources that includes log files, database, network behaviour, anti-virus, and status information (2) Data processing: collected data is processed to make it meet certain requirements (format and compatibility) (3) Data Analysis: processed data is analysed using clustering, predictions, and behavioural analysis to find out about user behaviour, system status, network traffic and misuse of files (4) Result: if any abnormal behaviour is detected, administrator is alerted about it.…”
Section: Network + Host-based Anomaly Detectionmentioning
confidence: 99%
“…Data mining techniques: Based on literature review, in order to find patterns among the data, data mining techniques will be applied. According to Ahn et al (2014) using classification techniques can help cyber experts to find current patterns and based on findings try to predict the future patterns. Naïve Bayes and decision tree algorithms are two suitable techniques can extract valuable information from uncertain knowledge.…”
Section: Discussionmentioning
confidence: 99%
“…Type of contained data and type of the task of each node will determine the value them. (Ahn et al 2014) Attack History: this attribute shows which nodes are more likely to be targeted by attackers based on previous observations in terms of cyber breaches. Dut et al (2012) propose an approach to defend against cyber-attacks based on Instance Based Learning Theory (IBLT).…”
Section: Das Et Al (2013) Apply Chi-square and Deviance Values To Thmentioning
confidence: 99%
“…Many papers proposed using big data on security for optimization and unknown attacks detection [17,18], as shown in Fig. 6.…”
Section: General Modelmentioning
confidence: 99%