Research explorer tool

13 results

Enhancing Big Data Security with Collaborative Intrusion Detection

Journal Article
Tan, Z., Nagar, U. T., He, X., Nanda, P., Liu, R. P., Wang, S., & Hu, J. (2014)
Enhancing Big Data Security with Collaborative Intrusion Detection. IEEE cloud computing, 1(3), 27-33. https://doi.org/10.1109/mcc.2014.53
Big data, often stored in cloud networks, is changing our business models and applications. Rich information residing in big data is driving business decision making to be a d...

Detection of Denial-of-Service Attacks Based on Computer Vision Techniques

Journal Article
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015)
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64(9), 2519-2533. https://doi.org/10.1109/tc.2014.2375218
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing ...

Improving cloud network security using the Tree-Rule firewall

Journal Article
He, X., Chomsiri, T., Nanda, P., & Tan, Z. (2014)
Improving cloud network security using the Tree-Rule firewall. Future Generation Computer Systems, 30, 116-126. https://doi.org/10.1016/j.future.2013.06.024
This study proposes a new model of firewall called the ‘Tree-Rule Firewall’, which offers various benefits and is applicable for large networks such as ‘cloud’ networks. The r...

Hybrid Tree-rule Firewall for High Speed Data Transmission

Journal Article
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2016)
Hybrid Tree-rule Firewall for High Speed Data Transmission. IEEE transactions on cloud computing, 1-1. https://doi.org/10.1109/tcc.2016.2554548
Traditional firewalls employ listed rules in both configuration and process phases to regulate network traffic. However, configuring a firewall with listed rules may create ru...

A Stateful Mechanism for the Tree-Rule Firewall

Conference Proceeding
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2014)
A Stateful Mechanism for the Tree-Rule Firewall. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, (122-129). https://doi.org/10.1109/trustcom.2014.20
In this paper, we propose a novel connection tracking mechanism for Tree-rule firewall which essentially organizes firewall rules in a designated Tree structure. A new firewal...

A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment

Conference Proceeding
Jan, M. A., Nanda, P., He, X., Tan, Z., & Liu, R. P. (2014)
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, (205-211). https://doi.org/10.1109/trustcom.2014.31
The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify themselves to the participating entities. This innovat...

Intrusion detection method based on nonlinear correlation measure

Journal Article
Ambusaidi, M. A., Tan, Z., He, X., Nanda, P., Lu, L. F., & Jamdagni, A. (2014)
Intrusion detection method based on nonlinear correlation measure. International Journal of Internet Protocol Technology, 8(2/3), 77. https://doi.org/10.1504/ijipt.2014.066377
Cyber crimes and malicious network activities have posed serious threats to the entire internet and its users. This issue is becoming more critical, as network-based services,...

A Novel Feature Selection Approach for Intrusion Detection Data Classification

Conference Proceeding
Ambusaidi, M. A., He, X., Tan, Z., Nanda, P., Lu, L. F., & Nagar, U. T. (2014)
A Novel Feature Selection Approach for Intrusion Detection Data Classification. https://doi.org/10.1109/trustcom.2014.15
Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing daily activities occurring in computer systems to detect occurrences of security threats...

A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis

Journal Article
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Ping Liu, R. (2014)
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis. IEEE Transactions on Parallel and Distributed Systems, 25(2), 447-456. https://doi.org/10.1109/tpds.2013.146
Interconnected systems, such as Web servers, database servers, cloud computing servers and so on, are now under threads from network attackers. As one of most common and aggre...

RePIDS: A multi tier Real-time Payload-based Intrusion Detection System

Journal Article
Jamdagni, A., Tan, Z., He, X., Nanda, P., & Liu, R. P. (2013)
RePIDS: A multi tier Real-time Payload-based Intrusion Detection System. Computer Networks, 57(3), 811-824. https://doi.org/10.1016/j.comnet.2012.10.002
Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature set to discriminate normal pattern and intrusive pattern. However, most of ex...