AN INTELLIGENT CYBER SECURITY DETECTION AND RESPONSE PLATFORM
DOI:
https://doi.org/10.53555/cse.v8i12.2167Keywords:
Cyber security, Security detection, Security response, Risk assessment, CSDRPAbstract
To further solve the cyber security challenges faced by the digital transformation of the Philippines university industry. This paper designed and proposed a cyber security detection and response platform (CSDRP), which can deal with traditional network security problems, improve the network security management capabilities of universities, and provide a method for real-time monitoring of network status and network security response in universities. With the outbreak of the epidemic, many universities in the Philippines have launched online courses and online services. These online courses and online services continue to proliferate, and with them come a host of cyber security risks and hidden dangers.
CSDRP extracts logs through the traffic probes, and the platform performs correlation analysis on many security logs, combines relevant models and machine learning algorithms and generates response logs, which can be responded to and linked with policies, and finally presents relevant threats visually. This study deploys the platform in the actual network environment. The experimental results show that it provides accurate threat warnings, as well as good real-time detection and visualization of cyber threats, and can collect logs from different data sources in real time. linkage of safety equipment.
Downloads
References
Logota, G. Mantas, J. Rodriguez, and H. Marques, “Analysis of the impact of denial of service attacks on centralized control in smart cities,” in International Wireless Internet Conference. Springer, 2014, pp. 91–96.
J. Johnson, S. J. Lincke, R. Imhof and C. Lim, "A comparison of international information security, "Interdisciplinary Journal of Information, vol. 9, pp. 89-116, 2014.
Goodwin and J. P. Nicholas, "A framework for cybersecurity information sharing and risk reduction, "Microsoft, 2015.
J. Mtsweni, N. A. Shozi, K. Matenche, M. Mutemwa, N. Mkhonto and J. J. v. Vuuren, "Development of a Semantic-Enabled Cybersecurity Threat Intelligence Sharing Model," Boston, 2016.
R. Richardson, "CSI computer crime and security survey," Computer Security Institute, pp. 1-30, 2008.
K. Chatfield, K. Simonyan, A. Vedaldi, and A. Zisserman. Return of the devil in the details: Delving deep into convolutional nets. In British Machine Vision Conference, 2014.
National Institute of Standards and Technology(NIST), “Overview: Nist cloud computing efforts, nist senior executive for cloud computing,”2010.
W.-T. Tsai, X. Sun, and J. Balasooriya, “Service-oriented cloud computing architecture,” in Proceedings of 2010 Seventh International Conference on Information Technology: New Generations (ITNG), 2010.
Y. Bengio, Learning deep architectures for AI, Foundations, and Trends in Machine Learning, vol. 2, iss. 1, pp. 1-127, 2009.
S. K. Datta, C. Bonnet, and N. Nikaein, “An IoT gateway centric architecture to provide novel m2m services,” in 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 514–519, 2014 .
Rivera, E. Montes de Oca, W. Mallouli, A. Cavalli, B. Vermeulen, and M. Vucnik, Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms, 10 2019, pp. 270–278.
J. Dean and S. Ghemawat, “Mapreduce: simplified data processing on large clusters,” Communications of the ACM, vol. 51, no. 1, pp. 107–113,2008.
Zhang, L. Ge, R. Hardy, W. Yu, H. Zhang, and R. Reschly, “On effective data aggregation techniques in host-based intrusion detection in manet,” in Proceedings of 2013 IEEE Consumer Communications and Networking Conference (CCNC), 2013.
Ten, G. Manimaran, and C. Liu, “Cybersecurity for critical infrastructures: Attack and defense modeling,” IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, vol. 40, no. 4, pp. 853–865, 2010.
P. D. Curtis and N. Mehravari, “Evaluating and improving cybersecurity capabilities of the energy critical infrastructure,” in 2015 IEEE International Symposium on Technologies for Homeland Security (HST), pp. 1–6, 2015
M. Cinque, D. Cotroneo, and A. Pecchia, “Challenges and directions in security information and event management (SIEM),” in 2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), pp. 95–99, 2018.
S. N. Matheu, J. L. Hernandez-Ramos, and A. F. Skarmeta, “Toward a cybersecurity certification framework for the internet of things,” IEEE Security Privacy, vol. 17, no. 3, pp. 66–76, 2019.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 International Journal For Research In Advanced Computer Science And Engineering
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
In consideration of the journal, Green Publication taking action in reviewing and editing our manuscript, the authors undersigned hereby transfer, assign, or otherwise convey all copyright ownership to the Editorial Office of the Green Publication in the event that such work is published in the journal. Such conveyance covers any product that may derive from the published journal, whether print or electronic. Green Publication shall have the right to register copyright to the Article in its name as claimant, whether separately
or as part of the journal issue or other medium in which the Article is included.
By signing this Agreement, the author(s), and in the case of a Work Made For Hire, the employer, jointly and severally represent and warrant that the Article is original with the author(s) and does not infringe any copyright or violate any other right of any third parties, and that the Article has not been published elsewhere, and is not being considered for publication elsewhere in any form, except as provided herein. Each author’s signature should appear below. The signing author(s) (and, in