17 results

An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay

Conference Proceeding
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2017)
An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay. In 2016 IEEE Trustcom/BigDataSE/I​SPA, (178-184). https://doi.org/10.1109/trustcom.2016.0061
The firewalls were invented since 1990s [1] and have been developed to operate more secure and faster. From the first era of the firewalls until today, they still regulate pac...

Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning

Conference Proceeding
Li, W., Meng, W., Tan, Z., & Xiang, Y. (2014)
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications,, (174-181). https://doi.org/10.1109/trustcom.2014.26
The goal of email classification is to classify user emails into spam and legitimate ones. Many supervised learning algorithms have been invented in this domain to accomplish ...

A Novel Feature Selection Approach for Intrusion Detection Data Classification

Conference Proceeding
Ambusaidi, M. A., He, X., Tan, Z., Nanda, P., Lu, L. F., & Nagar, U. T. (2014)
A Novel Feature Selection Approach for Intrusion Detection Data Classification. https://doi.org/10.1109/trustcom.2014.15
Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing daily activities occurring in computer systems to detect occurrences of security threats...

A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors

Conference Proceeding
Kumar Mishra, A., Kumar Tripathy, A., Obaidat, M. S., Tan, Z., Prasad, M., Sadoun, B., & Puthal, D. (2018)
A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors. In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, (89-98). https://doi.org/10.5220/0006850602550264
Due to lack of an efficient monitoring system to periodically record environmental parameters for food grain storage, a huge loss of food grains in storage is reported every y...

Reviving legacy enterprise systems with microservice-based architecture within cloud environments

Conference Proceeding
Habibullah, S., Liu, X., Tan, Z., Zhang, Y., & Liu, Q. (2019)
Reviving legacy enterprise systems with microservice-based architecture within cloud environments. In Computer Science Conference Proceedingshttps://doi.org/10.5121/csit.2019.90713
Evolution has always been a challenge for enterprise computing systems. The microservice based architecture is a new design model which is rapidly becoming one of the most eff...

A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment

Conference Proceeding
Jan, M. A., Nanda, P., He, X., Tan, Z., & Liu, R. P. (2014)
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, (205-211). https://doi.org/10.1109/trustcom.2014.31
The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify themselves to the participating entities. This innovat...

Intrusion Detection Using Geometrical Structure

Conference Proceeding
Jamdagni, A., Tan, Z., Nanda, P., He, X., & Liu, R. (2009)
Intrusion Detection Using Geometrical Structure. In Fourth International Conference on Frontier of Computer Science and Technology, 2009. FCST '09 (327-333). https://doi.org/10.1109/fcst.2009.97
We propose a statistical model, namely Geometrical Structure Anomaly Detection (GSAD) to detect intrusion using the packet payload in the network. GSAD takes into account the ...

Evaluation on multivariate correlation analysis based denial-of-service attack detection system

Conference Proceeding
Tan, Z., Jamdagni, A., Nanda, P., He, X., & Liu, R. P. (2012)
Evaluation on multivariate correlation analysis based denial-of-service attack detection system. In SecurIT '12 Proceedings of the First International Conference on Security of Internet of Things, 160-164. https://doi.org/10.1145/2490428.2490450
In this paper, a Denial-of-Service (DoS) attack detection system is explored, where a multivariate correlation analysis technique based on Euclidean distance is applied for ne...

A Multi-attributes-based Trust Model of Internet of Vehicle

Conference Proceeding
Ou, W., Luo, E., Tan, Z., Xiang, L., Yi, Q., & Tian, C. (2019)
A Multi-attributes-based Trust Model of Internet of Vehicle. In Network and System Security. , (706-713). https://doi.org/10.1007/978-3-030-36938-5_45
Internet of Vehicle (IoV) is an open network and it changes in constant, where there are large number of entities. Effective way to keep security of data in IoV is to establis...

A Stateful Mechanism for the Tree-Rule Firewall

Conference Proceeding
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2014)
A Stateful Mechanism for the Tree-Rule Firewall. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, (122-129). https://doi.org/10.1109/trustcom.2014.20
In this paper, we propose a novel connection tracking mechanism for Tree-rule firewall which essentially organizes firewall rules in a designated Tree structure. A new firewal...