AN INTELLIGENT CYBER SECURITY DETECTION AND RESPONSE PLATFORM

Authors

  • Song Zhuo University of the Cordilleras
  • Yang Yu Hong University of the Cordilleras
  • Thelma D. Palaoag University of the Cordilleras

DOI:

https://doi.org/10.53555/cse.v8i12.2167

Keywords:

Cyber security, Security detection, Security response, Risk assessment, CSDRP

Abstract

To further solve the cyber security challenges faced by the digital transformation of the Philippines university industry. This paper designed and proposed a cyber security detection and response platform (CSDRP), which can deal with traditional network security problems, improve the network security management capabilities of universities, and provide a method for real-time monitoring of network status and network security response in universities. With the outbreak of the epidemic, many universities in the Philippines have launched online courses and online services. These online courses and online services continue to proliferate, and with them come a host of cyber security risks and hidden dangers.

CSDRP extracts logs through the traffic probes, and the platform performs correlation analysis on many security logs, combines relevant models and machine learning algorithms and generates response logs, which can be responded to and linked with policies, and finally presents relevant threats visually. This study deploys the platform in the actual network environment. The experimental results show that it provides accurate threat warnings, as well as good real-time detection and visualization of cyber threats, and can collect logs from different data sources in real time. linkage of safety equipment.

Downloads

Download data is not yet available.

References

Logota, G. Mantas, J. Rodriguez, and H. Marques, “Analysis of the impact of denial of service attacks on centralized control in smart cities,” in International Wireless Internet Conference. Springer, 2014, pp. 91–96.

J. Johnson, S. J. Lincke, R. Imhof and C. Lim, "A comparison of international information security, "Interdisciplinary Journal of Information, vol. 9, pp. 89-116, 2014.

Goodwin and J. P. Nicholas, "A framework for cybersecurity information sharing and risk reduction, "Microsoft, 2015.

J. Mtsweni, N. A. Shozi, K. Matenche, M. Mutemwa, N. Mkhonto and J. J. v. Vuuren, "Development of a Semantic-Enabled Cybersecurity Threat Intelligence Sharing Model," Boston, 2016.

R. Richardson, "CSI computer crime and security survey," Computer Security Institute, pp. 1-30, 2008.

K. Chatfield, K. Simonyan, A. Vedaldi, and A. Zisserman. Return of the devil in the details: Delving deep into convolutional nets. In British Machine Vision Conference, 2014.

National Institute of Standards and Technology(NIST), “Overview: Nist cloud computing efforts, nist senior executive for cloud computing,”2010.

W.-T. Tsai, X. Sun, and J. Balasooriya, “Service-oriented cloud computing architecture,” in Proceedings of 2010 Seventh International Conference on Information Technology: New Generations (ITNG), 2010.

Y. Bengio, Learning deep architectures for AI, Foundations, and Trends in Machine Learning, vol. 2, iss. 1, pp. 1-127, 2009.

S. K. Datta, C. Bonnet, and N. Nikaein, “An IoT gateway centric architecture to provide novel m2m services,” in 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 514–519, 2014 .

Rivera, E. Montes de Oca, W. Mallouli, A. Cavalli, B. Vermeulen, and M. Vucnik, Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms, 10 2019, pp. 270–278.

J. Dean and S. Ghemawat, “Mapreduce: simplified data processing on large clusters,” Communications of the ACM, vol. 51, no. 1, pp. 107–113,2008.

Zhang, L. Ge, R. Hardy, W. Yu, H. Zhang, and R. Reschly, “On effective data aggregation techniques in host-based intrusion detection in manet,” in Proceedings of 2013 IEEE Consumer Communications and Networking Conference (CCNC), 2013.

Ten, G. Manimaran, and C. Liu, “Cybersecurity for critical infrastructures: Attack and defense modeling,” IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, vol. 40, no. 4, pp. 853–865, 2010.

P. D. Curtis and N. Mehravari, “Evaluating and improving cybersecurity capabilities of the energy critical infrastructure,” in 2015 IEEE International Symposium on Technologies for Homeland Security (HST), pp. 1–6, 2015

M. Cinque, D. Cotroneo, and A. Pecchia, “Challenges and directions in security information and event management (SIEM),” in 2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), pp. 95–99, 2018.

S. N. Matheu, J. L. Hernandez-Ramos, and A. F. Skarmeta, “Toward a cybersecurity certification framework for the internet of things,” IEEE Security Privacy, vol. 17, no. 3, pp. 66–76, 2019.

Downloads

Published

2022-12-14

How to Cite

Zhuo, S. ., Hong, Y. Y. ., & Palaoag, T. D. . (2022). AN INTELLIGENT CYBER SECURITY DETECTION AND RESPONSE PLATFORM. International Journal For Research In Advanced Computer Science And Engineering, 8(12), 1–10. https://doi.org/10.53555/cse.v8i12.2167