Network Attribute Selection, Classification and Accuracy (NASCA) Procedure for Intrusion Detection Systems
Title | Network Attribute Selection, Classification and Accuracy (NASCA) Procedure for Intrusion Detection Systems |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Stefanova, Z., Ramachandran, K. |
Conference Name | 2017 IEEE International Symposium on Technologies for Homeland Security (HST) |
Date Published | apr |
Publisher | IEEE |
ISBN Number | 978-1-5090-6356-7 |
Keywords | Adaptation models, compositionality, computer network security, Cyber Dependencies, cyber security space, cybersecurity, Data models, Entropy, four-stage intrusion detection method, Hidden Markov models, Human Behavior, human factors, Intrusion detection, Metrics, NASCA, NASCA procedure, Network, network attribute selection classification and accuracy procedure, Protocols, pubcrawl, resilience, Resiliency, Scalability, statistical learning procedure, unwanted intrusion detection, Vegetation, Vulnerability |
Abstract | With the progressive development of network applications and software dependency, we need to discover more advanced methods for protecting our systems. Each industry is equally affected, and regardless of whether we consider the vulnerability of the government or each individual household or company, we have to find a sophisticated and secure way to defend our systems. The starting point is to create a reliable intrusion detection mechanism that will help us to identify the attack at a very early stage; otherwise in the cyber security space the intrusion can affect the system negatively, which can cause enormous consequences and damage the system's privacy, security or financial stability. This paper proposes a concise, and easy to use statistical learning procedure, abbreviated NASCA, which is a four-stage intrusion detection method that can successfully detect unwanted intrusion to our systems. The model is static, but it can be adapted to a dynamic set up. |
URL | http://ieeexplore.ieee.org/document/7943463/ |
DOI | 10.1109/THS.2017.7943463 |
Citation Key | stefanova_network_2017 |
- Metrics
- Vulnerability
- Vegetation
- unwanted intrusion detection
- statistical learning procedure
- Scalability
- Resiliency
- resilience
- pubcrawl
- Protocols
- network attribute selection classification and accuracy procedure
- Network
- NASCA procedure
- NASCA
- Adaptation models
- Intrusion Detection
- Human Factors
- Human behavior
- Hidden Markov models
- four-stage intrusion detection method
- Entropy
- Data models
- Cybersecurity
- cyber security space
- Cyber Dependencies
- computer network security
- Compositionality