Εμφάνιση απλής εγγραφής

dc.creatorDemertzis K., Kikiras P., Tziritas N., Sanchez S.L., Iliadis L.en
dc.date.accessioned2023-01-31T07:53:30Z
dc.date.available2023-01-31T07:53:30Z
dc.date.issued2018
dc.identifier10.3390/bdcc2040035
dc.identifier.issn25042289
dc.identifier.urihttp://hdl.handle.net/11615/73208
dc.description.abstractA Security Operations Center (SOC) can be defined as an organized and highly skilled team that uses advanced computer forensics tools to prevent, detect and respond to cybersecurity incidents of an organization. The fundamental aspects of an effective SOC is related to the ability to examine and analyze the vast number of data flows and to correlate several other types of events from a cybersecurity perception. The supervision and categorization of network flow is an essential process not only for the scheduling, management, and regulation of the network’s services, but also for attacks identification and for the consequent forensics’ investigations. A serious potential disadvantage of the traditional software solutions used today for computer network monitoring, and specifically for the instances of effective categorization of the encrypted or obfuscated network flow, which enforces the rebuilding of messages packets in sophisticated underlying protocols, is the requirements of computational resources. In addition, an additional significant inability of these software packages is they create high false positive rates because they are deprived of accurate predicting mechanisms. For all the reasons above, in most cases, the traditional software fails completely to recognize unidentified vulnerabilities and zero-day exploitations. This paper proposes a novel intelligence driven Network Flow Forensics Framework (NF3) which uses low utilization of computing power and resources, for the Next Generation Cognitive Computing SOC (NGC2SOC) that rely solely on advanced fully automated intelligence methods. It is an effective and accurate Ensemble Machine Learning forensics tool to Network Traffic Analysis, Demystification of Malware Traffic and Encrypted Traffic Identification. © 2018 by the authors. Licensee MDPI, Basel, Switzerland.en
dc.language.isoenen
dc.sourceBig Data and Cognitive Computingen
dc.source.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85065925063&doi=10.3390%2fbdcc2040035&partnerID=40&md5=22b5fda44a1cd177835532781b5e29fd
dc.subjectComputer forensicsen
dc.subjectComputing poweren
dc.subjectCryptographyen
dc.subjectCybersecurityen
dc.subjectMachine learningen
dc.subjectNext generation networksen
dc.subjectSchedulingen
dc.subjectZero-day attacken
dc.subjectCyber securityen
dc.subjectDemystification of malware trafficen
dc.subjectEnsemble machine learningen
dc.subjectMachine-learningen
dc.subjectMalwaresen
dc.subjectNetwork flow forensicen
dc.subjectNetwork traffic analysisen
dc.subjectNetworks flowsen
dc.subjectSecurity operation centeren
dc.subjectTraffic identificationen
dc.subjectMalwareen
dc.subjectMDPIen
dc.titleThe next generation cognitive security operations center: Network flow forensics using cybersecurity intelligenceen
dc.typejournalArticleen


Αρχεία σε αυτό το τεκμήριο

ΑρχείαΜέγεθοςΤύποςΠροβολή

Δεν υπάρχουν αρχεία που να σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στις ακόλουθες συλλογές

Εμφάνιση απλής εγγραφής