Logo
    • English
    • Ελληνικά
    • Deutsch
    • français
    • italiano
    • español
  • Ελληνικά 
    • English
    • Ελληνικά
    • Deutsch
    • français
    • italiano
    • español
  • Σύνδεση
Προβολή τεκμηρίου 
  •   Ιδρυματικό Αποθετήριο Πανεπιστημίου Θεσσαλίας
  • Επιστημονικές Δημοσιεύσεις Μελών ΠΘ (ΕΔΠΘ)
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ.
  • Προβολή τεκμηρίου
  •   Ιδρυματικό Αποθετήριο Πανεπιστημίου Θεσσαλίας
  • Επιστημονικές Δημοσιεύσεις Μελών ΠΘ (ΕΔΠΘ)
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ.
  • Προβολή τεκμηρίου
JavaScript is disabled for your browser. Some features of this site may not work without it.
Ιδρυματικό Αποθετήριο Πανεπιστημίου Θεσσαλίας
Όλο το DSpace
  • Κοινότητες & Συλλογές
  • Ανά ημερομηνία δημοσίευσης
  • Συγγραφείς
  • Τίτλοι
  • Λέξεις κλειδιά

The next generation cognitive security operations center: Network flow forensics using cybersecurity intelligence

Thumbnail
Συγγραφέας
Demertzis K., Kikiras P., Tziritas N., Sanchez S.L., Iliadis L.
Ημερομηνία
2018
Γλώσσα
en
DOI
10.3390/bdcc2040035
Λέξη-κλειδί
Computer forensics
Computing power
Cryptography
Cybersecurity
Machine learning
Next generation networks
Scheduling
Zero-day attack
Cyber security
Demystification of malware traffic
Ensemble machine learning
Machine-learning
Malwares
Network flow forensic
Network traffic analysis
Networks flows
Security operation center
Traffic identification
Malware
MDPI
Εμφάνιση Μεταδεδομένων
Επιτομή
A Security Operations Center (SOC) can be defined as an organized and highly skilled team that uses advanced computer forensics tools to prevent, detect and respond to cybersecurity incidents of an organization. The fundamental aspects of an effective SOC is related to the ability to examine and analyze the vast number of data flows and to correlate several other types of events from a cybersecurity perception. The supervision and categorization of network flow is an essential process not only for the scheduling, management, and regulation of the network’s services, but also for attacks identification and for the consequent forensics’ investigations. A serious potential disadvantage of the traditional software solutions used today for computer network monitoring, and specifically for the instances of effective categorization of the encrypted or obfuscated network flow, which enforces the rebuilding of messages packets in sophisticated underlying protocols, is the requirements of computational resources. In addition, an additional significant inability of these software packages is they create high false positive rates because they are deprived of accurate predicting mechanisms. For all the reasons above, in most cases, the traditional software fails completely to recognize unidentified vulnerabilities and zero-day exploitations. This paper proposes a novel intelligence driven Network Flow Forensics Framework (NF3) which uses low utilization of computing power and resources, for the Next Generation Cognitive Computing SOC (NGC2SOC) that rely solely on advanced fully automated intelligence methods. It is an effective and accurate Ensemble Machine Learning forensics tool to Network Traffic Analysis, Demystification of Malware Traffic and Encrypted Traffic Identification. © 2018 by the authors. Licensee MDPI, Basel, Switzerland.
URI
http://hdl.handle.net/11615/73208
Collections
  • Δημοσιεύσεις σε περιοδικά, συνέδρια, κεφάλαια βιβλίων κλπ. [19674]

Related items

Showing items related by title, author, creator and subject.

  • Thumbnail

    CONTENT project: Considerations towards a cloud-based internetworking paradigm 

    Katsalis, K.; Korakis, T.; Landi, G.; Bernini, G.; Rofoee, B. R.; Peng, S.; Anastasopoulos, M.; Tzanakaki, A.; Christofi, D.; Georgiades, M.; Larsen, R.; Riera, J. F.; Escalona, E.; Garcia-Espin, J. A. (2013)
    Although cloud computing and the Software Defined Network (SDN) framework are fundamentally changing the way we think about network services, multi-domain and multitechnology problems are not sufficiently investigated. ...
  • Thumbnail

    Backbone formation in military multi-layer ad hoc networks using complex network concepts 

    Papakostas D., Basaras P., Katsaros D., Tassiulas L. (2016)
    Modern battlefields are characterized by increasing deployment of ad hoc communications among allied entities. These networks can be seen as a complex multi-layer ad hoc network, where each layer may be an independently ...
  • Thumbnail

    Query sensitive storage for wireless sensor networks 

    Papadimitriou, A.; Katsaros, D.; Manolopoulos, Y. (2009)
    Storage management in wireless sensor networks is an area that has started to attract significant attention, and several methods have been proposed, such as Local Storage (LS), Data-Centric Storage (DCS) and more recently ...
Η δικτυακή πύλη της Ευρωπαϊκής Ένωσης
Ψηφιακή Ελλάδα
ΕΣΠΑ 2007-2013
Με τη συγχρηματοδότηση της Ελλάδας και της Ευρωπαϊκής Ένωσης
htmlmap 

 

Πλοήγηση

Όλο το DSpaceΚοινότητες & ΣυλλογέςΑνά ημερομηνία δημοσίευσηςΣυγγραφείςΤίτλοιΛέξεις κλειδιάΑυτή η συλλογήΑνά ημερομηνία δημοσίευσηςΣυγγραφείςΤίτλοιΛέξεις κλειδιά

Ο λογαριασμός μου

ΣύνδεσηΕγγραφή (MyDSpace)
Πληροφορίες-Επικοινωνία
ΑπόθεσηΣχετικά μεΒοήθειαΕπικοινωνήστε μαζί μας
Επιλογή ΓλώσσαςΌλο το DSpace
EnglishΕλληνικά
Η δικτυακή πύλη της Ευρωπαϊκής Ένωσης
Ψηφιακή Ελλάδα
ΕΣΠΑ 2007-2013
Με τη συγχρηματοδότηση της Ελλάδας και της Ευρωπαϊκής Ένωσης
htmlmap