Designing a holistic end-to-end intelligent network analysis and security platform

Firewall protects a network from outside attacks, however, once an attack entering a network, it is difficult to detect. Recent significance accidents happened. i.e.: millions of Yahoo email account were stolen and crucial data from institutions are held for ransom. Within two year Yahoo's syst...

Full description

Saved in:
Bibliographic Details
Published inJournal of physics. Conference series Vol. 978; no. 1; pp. 12100 - 12108
Main Author Alzahrani, M
Format Journal Article
LanguageEnglish
Published Bristol IOP Publishing 01.03.2018
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Firewall protects a network from outside attacks, however, once an attack entering a network, it is difficult to detect. Recent significance accidents happened. i.e.: millions of Yahoo email account were stolen and crucial data from institutions are held for ransom. Within two year Yahoo's system administrators were not aware that there are intruder inside the network. This happened due to the lack of intelligent tools to monitor user behaviour in internal network. This paper discusses a design of an intelligent anomaly/malware detection system with proper proactive actions. The aim is to equip the system administrator with a proper tool to battle the insider attackers. The proposed system adopts machine learning to analyse user's behaviour through the runtime behaviour of each node in the network. The machine learning techniques include: deep learning, evolving machine learning perceptron, hybrid of Neural Network and Fuzzy, as well as predictive memory techniques. The proposed system is expanded to deal with larger network using agent techniques.
AbstractList Firewall protects a network from outside attacks, however, once an attack entering a network, it is difficult to detect. Recent significance accidents happened. i.e.: millions of Yahoo email account were stolen and crucial data from institutions are held for ransom. Within two year Yahoo’s system administrators were not aware that there are intruder inside the network. This happened due to the lack of intelligent tools to monitor user behaviour in internal network. This paper discusses a design of an intelligent anomaly/malware detection system with proper proactive actions. The aim is to equip the system administrator with a proper tool to battle the insider attackers. The proposed system adopts machine learning to analyse user’s behaviour through the runtime behaviour of each node in the network. The machine learning techniques include: deep learning, evolving machine learning perceptron, hybrid of Neural Network and Fuzzy, as well as predictive memory techniques. The proposed system is expanded to deal with larger network using agent techniques.
Author Alzahrani, M
Author_xml – sequence: 1
  givenname: M
  surname: Alzahrani
  fullname: Alzahrani, M
  email: msawileh@bu.edu.sa
  organization: Department of Information Technology, College of Computer Science & IT, Albaha University , Saudi Arabia
BookMark eNqFkFtLAzEQhYNUsK3-BQn45MPaZG_JPkq9U1C8PIdsdrambpM1SZH-e1NWFEFwXmaGOecwfBM0MtYAQseUnFHC-YyyPE3KoipnFYvbjNCUErKHxt-H0ffM-QGaeL8iJIvFxujxArxeGm2WWOJX22kftMJgmiTYJDasTYCu00swARsIH9a9YWlkt_Xax6HBHtTG6bDFfSdDa936EO23svNw9NWn6OXq8nl-kyzur2_n54tEZUURkqJVpAJayrYikDaZypu8hryuKUsZp2VWtrwhrZScAqUKoM4VYRIILwtZKpVN0cmQ2zv7vgEfxMpuXHzNi7RgKeGEZUVUlYNKOeu9g1b0Tq-l2wpKxI6f2KERO0wi8hNUDPyiMR2M2vY_yf-aTv8w3T3Mn37pRN-02SeTgoJT
Cites_doi 10.1109/NSS.2009.55
10.1109/72.286889
10.1109/SAINTW.2005.1620003
10.1016/j.is.2009.08.003
10.1109/RoEduNet.2011.5993687
10.1109/COMST.2017.2707140
10.1109/ICHIT.2008.249
10.1016/S0167-4048(03)00710-7
ContentType Journal Article
Copyright Published under licence by IOP Publishing Ltd
2018. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: Published under licence by IOP Publishing Ltd
– notice: 2018. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID O3W
TSCCA
AAYXX
CITATION
8FD
8FE
8FG
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
H8D
HCIFZ
L7M
P5Z
P62
PIMPY
PQEST
PQQKQ
PQUKI
PRINS
DOI 10.1088/1742-6596/978/1/012100
DatabaseName IOP Publishing
IOPscience (Open Access)
CrossRef
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni)
ProQuest Central
Advanced Technologies & Aerospace Database‎ (1962 - current)
ProQuest Central Essentials
AUTh Library subscriptions: ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central Korea
Aerospace Database
SciTech Premium Collection
Advanced Technologies Database with Aerospace
ProQuest Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
Publicly Available Content Database
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
DatabaseTitle CrossRef
Publicly Available Content Database
Advanced Technologies & Aerospace Collection
Technology Collection
Technology Research Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central China
ProQuest Central
Advanced Technologies & Aerospace Database
Aerospace Database
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest One Academic
Advanced Technologies Database with Aerospace
DatabaseTitleList Publicly Available Content Database

Database_xml – sequence: 1
  dbid: O3W
  name: IOP Publishing
  url: http://iopscience.iop.org/
  sourceTypes:
    Enrichment Source
    Publisher
– sequence: 2
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Physics
DocumentTitleAlternate Designing a holistic end-to-end intelligent network analysis and security platform
EISSN 1742-6596
ExternalDocumentID 10_1088_1742_6596_978_1_012100
JPCS_978_1_012100
GroupedDBID 1JI
29L
2WC
4.4
5B3
5GY
5PX
5VS
7.Q
AAJIO
AAJKP
AALHV
ABHWH
ACAFW
ACHIP
AEFHF
AEJGL
AFKRA
AFYNE
AIYBF
AKPSB
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ASPBG
ATQHT
AVWKF
AZFZN
BENPR
BGLVJ
CCPQU
CEBXE
CJUJL
CRLBU
CS3
DU5
E3Z
EBS
EDWGO
EJD
EQZZN
F5P
FRP
GROUPED_DOAJ
GX1
HCIFZ
HH5
IJHAN
IOP
IZVLO
J9A
KNG
KQ8
LAP
N5L
N9A
O3W
OK1
P2P
PIMPY
PJBAE
RIN
RNS
RO9
ROL
SY9
T37
TR2
TSCCA
UCJ
W28
XSB
~02
02O
1WK
AAYXX
AHSEE
BBWZM
C1A
CITATION
FEDTE
H13
HVGLF
JCGBZ
M48
Q02
S3P
8FD
8FE
8FG
ABUWG
AZQEC
DWQXO
H8D
L7M
P62
PQEST
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c355t-5fc09e16af90e2d3c4d4be4bb172781636f8d0faa81e11ceeb4c07ae0865a6cc3
IEDL.DBID BENPR
ISSN 1742-6588
IngestDate Fri Sep 13 06:04:01 EDT 2024
Fri Aug 23 03:08:07 EDT 2024
Wed Aug 21 03:41:51 EDT 2024
Thu Jan 07 13:51:51 EST 2021
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
License Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c355t-5fc09e16af90e2d3c4d4be4bb172781636f8d0faa81e11ceeb4c07ae0865a6cc3
OpenAccessLink https://www.proquest.com/docview/2572080735/abstract/?pq-origsite=%requestingapplication%
PQID 2572080735
PQPubID 4998668
PageCount 9
ParticipantIDs proquest_journals_2572080735
iop_journals_10_1088_1742_6596_978_1_012100
crossref_primary_10_1088_1742_6596_978_1_012100
PublicationCentury 2000
PublicationDate 20180301
PublicationDateYYYYMMDD 2018-03-01
PublicationDate_xml – month: 03
  year: 2018
  text: 20180301
  day: 01
PublicationDecade 2010
PublicationPlace Bristol
PublicationPlace_xml – name: Bristol
PublicationTitle Journal of physics. Conference series
PublicationTitleAlternate J. Phys.: Conf. Ser
PublicationYear 2018
Publisher IOP Publishing
Publisher_xml – name: IOP Publishing
References 13
Rahmat R (21) 2015; 12
Wang C.Y. (1) 2009
14
Pasha MF (22) 2010; 6
15
Yin Q. (4) 2004
Liu F. (16) 2006
Barabas M (11) 2011
Gwon Y. L (17) 2014
Hawkins J. (19) 2005
2
Ngia J (18) 2011
Sun Y (3) 2010
Pasha MF (20) 2008
6
7
8
Qiao H. (5) 2007
9
Zhang J. (12) 2009; 09
Pais I. (10) 2009
Hasibuan Z A (23) 2009; 9
References_xml – start-page: 4370
  year: 2004
  ident: 4
  publication-title: AnalysisIEEE Proceeding of the 5th World Congress on Inteligent Control and Automation
  contributor:
    fullname: Yin Q.
– year: 2007
  ident: 5
  publication-title: Proceedings of the 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS’07)
  contributor:
    fullname: Qiao H.
– ident: 7
  doi: 10.1109/NSS.2009.55
– start-page: 18
  year: 2014
  ident: 17
  publication-title: Proceedings of the 11th International Conference on Autonomic Computing (ICAC ’14)
  contributor:
    fullname: Gwon Y. L
– start-page: 1341
  year: 2009
  ident: 1
  publication-title: IEEE Computer Society Seventh Annual Communications Networks and Services Research Conference
  contributor:
    fullname: Wang C.Y.
– ident: 13
  doi: 10.1109/72.286889
– start-page: 392
  year: 2006
  ident: 16
  publication-title: Proceeding of the First International Conference on Innovative Computing, Information and Control - Volume II (ICICIC'06)
  contributor:
    fullname: Liu F.
– ident: 8
  doi: 10.1109/SAINTW.2005.1620003
– ident: 2
  doi: 10.1016/j.is.2009.08.003
– start-page: 1
  year: 2010
  ident: 3
  publication-title: IEEE Proceeding Computer Communications and Networks (ICCCN)
  contributor:
    fullname: Sun Y
– ident: 14
  doi: 10.1109/RoEduNet.2011.5993687
– ident: 15
  doi: 10.1109/COMST.2017.2707140
– ident: 6
  doi: 10.1109/ICHIT.2008.249
– volume: 09
  start-page: 465
  year: 2009
  ident: 12
  publication-title: Autonomic and Trusted Computing
  contributor:
    fullname: Zhang J.
– year: 2005
  ident: 19
  publication-title: On Intelligence
  contributor:
    fullname: Hawkins J.
– start-page: 1
  year: 2009
  ident: 10
  publication-title: Intelligence in Next Generation Networks
  contributor:
    fullname: Pais I.
– volume: 12
  start-page: 532
  issn: 1683-3198
  year: 2015
  ident: 21
  publication-title: International Arab Journal of Information Technology
  contributor:
    fullname: Rahmat R
– ident: 9
  doi: 10.1016/S0167-4048(03)00710-7
– volume: 9
  start-page: 43
  year: 2009
  ident: 23
  publication-title: IJCSNS International Journal of Computer Science and Network Security
  contributor:
    fullname: Hasibuan Z A
– year: 2011
  ident: 11
  publication-title: The 3rd International Conference on Emerging Network Intelligence
  contributor:
    fullname: Barabas M
– year: 2011
  ident: 18
  publication-title: International Conference on Machine Learning (ICML)
  contributor:
    fullname: Ngia J
– start-page: 490
  year: 2008
  ident: 20
  publication-title: Proc. of Int. Conf. on Artificial Intelligence 2008
  contributor:
    fullname: Pasha MF
– volume: 6
  start-page: 1005
  year: 2010
  ident: 22
  publication-title: International Journal of Innovative Computing, Information and Control
  contributor:
    fullname: Pasha MF
SSID ssj0033337
Score 2.1892457
Snippet Firewall protects a network from outside attacks, however, once an attack entering a network, it is difficult to detect. Recent significance accidents...
SourceID proquest
crossref
iop
SourceType Aggregation Database
Enrichment Source
Publisher
StartPage 12100
SubjectTerms Deep learning
Fuzzy logic
Intelligent networks
Machine learning
Malware
Network analysis
Neural networks
Physics
SummonAdditionalLinks – databaseName: IOP Publishing
  dbid: O3W
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8QwEA66IngRn7i6ShBvEvtOk6Ooy7IHFXXRW8gTBOkWt_5_J02rLCJiL81h2oZpZ-YL_eYLQmdMp8zJIoH4ppbkTENIldoRGUupLeVSBbXPWzqZ5dOXomcTtr0w87pL_RcwDELBwYUdIY5FgKFTQgtOvTpslERelSyGVfsa1N7Us_rusuc-GWdwlKEn0l_DWN8k_Ot9lurTKszhR5JuK894C212kBFfhgluoxVb7aD1lrqpF7vo4bolYUAJwhJDLmuVl7GtDGnmBE749Ut1s8FVYH1j2WmRwMDgRbeHHa7fZONB7B6ajW-eriak2ymBaMALDSmcjrlNqHQ8tqnJdG5yZXOlPDxhALmoYyZ2UrLEJgnURZXruJQW1jOFpFpn-2hQzSt7gDBNlYsNT7j2LXAFwEfFqKYl1zwzhcqGKOr9I-ogiCHaH9mMCe9R4T0qwKMiEcGjQ3QObhRdbCz-tD5dsp7eXz0uGYjauCEa9e_k2xKSTwr4t8yKw3898QhtAApigVg2QoPm_cMeA9Jo1En7LX0CSe3GBg
  priority: 102
  providerName: IOP Publishing
Title Designing a holistic end-to-end intelligent network analysis and security platform
URI https://iopscience.iop.org/article/10.1088/1742-6596/978/1/012100
https://www.proquest.com/docview/2572080735/abstract/
Volume 978
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV1LT-MwEB5RENJeELCgLVsqC3FDVuI8HOe0gkIpHKDiIbhZfkVCQmmg2f-_4zxgERLk4FjJnMb2zGd75huAQ2EiUaiU4frmjibC4JLKTEFVqJRxPFe6Zfu84rP75PIxfVyBWZ8L48Mqe5vYGGq7MP6MPMCpFSG6yeI0UNqfApg6-FO9UF8_yt-zdsU0BrAWscRf2K6dnF3Nb3qrHOOTtcmREUWvK_psYdwAdt9y7ulmAxZ4mjOf8fafoxo8LapP1rpxQdNN2OiwIzluB3sLVly5DetNDKdZ_oSb0yYaA30RUQSNWkPBTFxpab2g-CJPb_SbNSnb8G-iOlIS7Fiy7IrZkepZ1R7N7sD99OxuMqNdyQRqEDjUNC1MmDvGVZGHLrKxSWyiXaK1xykCsRcvhA0LpQRzjKGD1IkJM-VwY5Mqbky8C6vlonS_gPBIF6HNWW58LlyKOFILbniWmzy2qY6HEPT6kVXLjCGbG20hpNeo9BqVqFHJZKvRIRyhGmW3SJbfSh98kL6cT24_CMjKFkMY9WPyLvk-Vfa-_v0bfiD-EW1I2QhW69e_bh8xRq3HMBDT83E3icbe3qfYXlzPsb2OH_4BQKbPDQ
link.rule.ids 315,786,790,12792,21416,27957,27958,33408,33779,38900,38925,43635,43840,53877,53903
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV1LSwMxEA5WEb2IT6zPIN4kdJ_Z7EmkWuuriLbQW8hroSDb1a7_38lu1loE3csu2TlNJjNfkplvEDpnKmCZiH1Y39SQiClYUonKiPCEUIamQtZsnwPaH0X343jsDtxmLq2y8YmVo9ZTZc_IO2BaAaCbJIwvi3diu0bZ21XXQqOFVqIQQqetFO_dNp44hCepCyIDApGWNRXCsOlzYym1FLMdv2OpzWyV24_g1JpMi18eugo7vU204fAivqoneAstmXwbrVZ5m2q2g16uqwwMiD9YYHBkFe0yNrkm5ZTAC0--KTdLnNcp31g4IhL40HjmGtjh4k2UFsHuolHvZtjtE9cmgSgACyWJM-WlxqciSz0T6FBFOpImktJiEwZ4i2ZMe5kQzDe-D0FRRspLhIHNTCyoUuEeWs6nudlHmAYy83Tqp8rWv8WAHSWjiiapSkMdy7CNOo1-eFGzYfDqFpsxbjXKrUY5aJT7vNZoG12AGrlbGLN_pc8WpO-fu68LArzQWRsdNXMyl5ybx8Hfv0_RWn_49Mgf7wYPh2gd8A-rU8qO0HL58WmOAWOU8qQypC8FrMkL
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8QwEB52FcWL-MT1GcSb1D6TpkdxXdZVVHygt5CkKQjSLW79_06a7soiIvbSHKZt-JLMfKEzXwBOuI54IWmI65sZL-Eal1SqC08GUmrDMqmc2uctGz4no1f62oHLWS3MuGpd_xk2nVCwg7BNiOM-cujIYzRjVh3WD32rShYEfpUXXVikuIe30_0ufpk65Biv1NVF2uc4nxYK__quuRjVxX78cNRN9BmswWpLG8m56-Q6dEy5AUtN-qaebMJDv0nEwDBEJEF_1qgvE1PmXj328EbeZsqbNSld5jeRrR4JNnIyac-xI9W7rC2R3YLnweXTxdBrT0vwNHKG2qOFDjITMllkgYnyWCd5okyilKUoHGkXK3geFFLy0IQhxkaV6CCVBvc0VDKt421YKMel2QHCIlUEeRZm2pbBUaSQijPN0kxncU5V3AN_io-onCiGaH5mcy4sosIiKhBREQqHaA9OEUbRro_Jn9bHc9aj-4vHOQOBg92D_emYfFuiA4qQA6cx3f3XF49g-b4_EDdXt9d7sIKkiLs8s31YqD8-zQESj1odNtPqC8PQyfo
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Designing+a+holistic+end-to-end+intelligent+network+analysis+and+security+platform&rft.jtitle=Journal+of+physics.+Conference+series&rft.au=Alzahrani%2C+M&rft.date=2018-03-01&rft.pub=IOP+Publishing&rft.issn=1742-6588&rft.eissn=1742-6596&rft.volume=978&rft.issue=1&rft_id=info:doi/10.1088%2F1742-6596%2F978%2F1%2F012100
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1742-6588&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1742-6588&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1742-6588&client=summon