Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
Journal Article
Ambusaidi, M. A., He, X., Nanda, P., & Tan, Z. (2016)
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm. IEEE Transactions on Computers, 65(10), 2986-2998. https://doi.org/10.1109/tc.2016.2519914
Redundant and irrelevant features in data have caused a long-term problem in network traffic classification. These features not only slow down the process of classification bu...
Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection
Journal Article
Tian, Z., Shi, W., Tan, Z., Qiu, J., Sun, Y., Jiang, F., & Liu, Y. (in press)
Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. Mobile Networks and Applications, https://doi.org/10.1007/s11036-020-01656-7
Organizations' own personnel now have a greater ability than ever before to misuse their access to critical organizational assets. Insider threat detection is a key component ...
An Intrusion Detection System Based on Polynomial Feature Correlation Analysis
Conference Proceeding
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X., & Han, W. (2017)
An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/ISPA Conference Proceedingshttps://doi.org/10.1109/trustcom/bigdatase/icess.2017.340
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was design...
Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization
Conference Proceeding
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2011)
Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization. In S. Qing, W. Susilo, G. Wang, & D. Liu (Eds.), Information and Communications Security. , (388-398). https://doi.org/10.1007/978-3-642-25243-3_31
The quality of feature has significant impact on the performance of detection techniques used for Denial-of-Service (DoS) attack. The features that fail to provide accurate ch...
PTAOD: A Novel Framework For Supporting Approximate Outlier Detection over Streaming Data for Edge Computing
Journal Article
Zhu, R., Yu, T., Tan, Z., Du, W., Zhao, L., Li, J., & Xia, X. (2019)
PTAOD: A Novel Framework For Supporting Approximate Outlier Detection over Streaming Data for Edge Computing. IEEE Access, 8, 1475-1485. https://doi.org/10.1109/ACCESS.2019.2962066
Outlier detection over sliding window is a fundamental problem in the domain of streaming data management, which has been studied over 10 years. The key of supporting outlier ...
A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks
Journal Article
Khan, F., Ur Rehman, A., Yahya, A., Jan, M. A., Chuma, J., Tan, Z., & Hussain, K. (2019)
A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks. Sensors, 19, https://doi.org/10.3390/s19194321
The Internet of Things (IoT) is an emerging technology that aims to enable the interconnection of a large number of smart devices and heterogeneous networks. Ad hoc networks p...
Hybrid Tree-rule Firewall for High Speed Data Transmission
Journal Article
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2016)
Hybrid Tree-rule Firewall for High Speed Data Transmission. IEEE transactions on cloud computing, 1-1. https://doi.org/10.1109/tcc.2016.2554548
Traditional firewalls employ listed rules in both configuration and process phases to regulate network traffic. However, configuring a firewall with listed rules may create ru...
Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors
Journal Article
Lenka, R. K., Rath, A. K., Tan, Z., Sharma, S., Puthal, D., Simha, N. V. R., …Tripathi, S. S. (2018)
Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors. IEEE Access, 6, 30162-30173. https://doi.org/10.1109/ACCESS.2018.2842760
Wireless Sensors are an important component to develop the Internet of Things (IoT) Sensing infrastructure. There are enormous numbers of sensors connected with each other to ...
A framework for data security in cloud using collaborative intrusion detection scheme
Conference Proceeding
Nagar, U., Nanda, P., He, X., & Tan, Z. (. (2017)
A framework for data security in cloud using collaborative intrusion detection scheme. In Proceedings of 10th International Conference On Security Of Information And Networks. , (188-193). https://doi.org/10.1145/3136825.3136905
Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go featu...
ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System
Journal Article
Javaid, S., Afzal, H., Babar, M., Arif, F., Tan, Z., & Jan, M. A. (2019)
ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System. IEEE Access, 1-1. https://doi.org/10.1109/access.2019.2897095
Putting trust in the world of the Internet of Things, where served and serving entities are often unknown, is very hard especially when personal and business information is of...