25 results

Evaluation on multivariate correlation analysis based denial-of-service attack detection system

Conference Proceeding
Tan, Z., Jamdagni, A., Nanda, P., He, X., & Liu, R. P. (2012)
Evaluation on multivariate correlation analysis based denial-of-service attack detection system. In SecurIT '12 Proceedings of the First International Conference on Security of Internet of Things, 160-164. https://doi.org/10.1145/2490428.2490450
In this paper, a Denial-of-Service (DoS) attack detection system is explored, where a multivariate correlation analysis technique based on Euclidean distance is applied for ne...

A Multi-attributes-based Trust Model of Internet of Vehicle

Conference Proceeding
Ou, W., Luo, E., Tan, Z., Xiang, L., Yi, Q., & Tian, C. (2019)
A Multi-attributes-based Trust Model of Internet of Vehicle. In Network and System Security. , (706-713). https://doi.org/10.1007/978-3-030-36938-5_45
Internet of Vehicle (IoV) is an open network and it changes in constant, where there are large number of entities. Effective way to keep security of data in IoV is to establis...

Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme

Conference Proceeding
Babaagba, K. O., Tan, Z., & Hart, E. (2019)
Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme. In Dependability in Sensor, Cloud, and Big Data Systems and Applications. , (369-382). https://doi.org/10.1007/978-981-15-1304-6_29
The ability to detect metamorphic malware has generated significant research interest over recent years, particularly given its proliferation on mobile devices. Such malware i...

Intrusion Detection Using Geometrical Structure

Conference Proceeding
Jamdagni, A., Tan, Z., Nanda, P., He, X., & Liu, R. (2009)
Intrusion Detection Using Geometrical Structure. In Fourth International Conference on Frontier of Computer Science and Technology, 2009. FCST '09 (327-333). https://doi.org/10.1109/fcst.2009.97
We propose a statistical model, namely Geometrical Structure Anomaly Detection (GSAD) to detect intrusion using the packet payload in the network. GSAD takes into account the ...

Mobility Aware Duty Cycling Algorithm (MADCAL) in Wireless Sensor Network with Mobile Sink Node

Conference Proceeding
Thomson, C., Wadhaj, I., Tan, Z., & Al-Dubai, A. (2019)
Mobility Aware Duty Cycling Algorithm (MADCAL) in Wireless Sensor Network with Mobile Sink Node. In 2019 IEEE International Conference on Smart Internet of Things (SmartIoT). https://doi.org/10.1109/SmartIoT.2019.00037
In Wireless Sensor Networks (WSNs) the use of Mobile Sink Nodes (MSNs) has been proposed in order to negate the ”hotspot” issue. This where nodes closest to the sink node shal...

A 3D Smooth Random Walk Mobility Model for FANETs

Conference Proceeding
Lin, N., Gao, F., Zhao, L., Al-Dubai, A., & Tan, Z. (2019)
A 3D Smooth Random Walk Mobility Model for FANETs. In 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00075
The number of Unmanned Aerial Vehicles (UAVs) applications has increased over the past few years. Among all scenarios, UAV group consisting multi-UAVs is normally used to prov...

A Stateful Mechanism for the Tree-Rule Firewall

Conference Proceeding
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2014)
A Stateful Mechanism for the Tree-Rule Firewall. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, (122-129). https://doi.org/10.1109/trustcom.2014.20
In this paper, we propose a novel connection tracking mechanism for Tree-rule firewall which essentially organizes firewall rules in a designated Tree structure. A new firewal...

An Intrusion Detection System Based on Polynomial Feature Correlation Analysis

Conference Proceeding
Li, Q., Tan, Z., Jamdagni, A., Nanda, P., He, X., & Han, W. (2017)
An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. In 2017 IEEE Trustcom/BigDataSE/I​SPA Conference Proceedingshttps://doi.org/10.1109/trustcom/bigdatase/icess.2017.340
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network traffic with a distance-based classifier. A polynomial approach was design...

Intrusion detection using GSAD model for HTTP traffic on web services

Conference Proceeding
Jamdagni, A., Tan, Z., Nanda, P., He, X., & Liu, R. P. (2010)
Intrusion detection using GSAD model for HTTP traffic on web services. In IWCMC '10 Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, (1193-1197). https://doi.org/10.1145/1815396.1815669
Intrusion detection systems are widely used security tools to detect cyber-attacks and malicious activities in computer systems and networks. Hypertext Transport Protocol (HTT...

Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization

Conference Proceeding
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2011)
Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization. In S. Qing, W. Susilo, G. Wang, & D. Liu (Eds.), Information and Communications Security. , (388-398). https://doi.org/10.1007/978-3-642-25243-3_31
The quality of feature has significant impact on the performance of detection techniques used for Denial-of-Service (DoS) attack. The features that fail to provide accurate ch...