Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rezapour, Amir | en_US |
dc.contributor.author | Tzeng, Wen-Guey | en_US |
dc.date.accessioned | 2020-07-01T05:22:13Z | - |
dc.date.available | 2020-07-01T05:22:13Z | - |
dc.date.issued | 2020-05-01 | en_US |
dc.identifier.issn | 1016-2364 | en_US |
dc.identifier.uri | http://dx.doi.org/10.6688/JISE.202005_36(3).0008 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/154632 | - |
dc.description.abstract | As networks become ubiquitous in our daily lives, users rely more on networks for exchanging data and communication. However, numerous new and sophisticated attacks that endanger security of users have been reported. In practice, blacklisting illicit sources has been a fundamental defense strategy in recent years. In this paper, we propose a predictor that is based on the observations from a centralized log-sharing infrastructure. Our observations include the direct relation between attackers and victims, victim similarities, and attacker correlations. We compile a customized blacklist for each Dshield.org contributor using a weighted function of direct and indirect relations between victims and attackers. This list not only offers a significantly higher prediction ratio, but also includes source addresses with potentially higher threats. We evaluate our predictor using two months of malicious activities acquired from Dshield.org. The experimental results demonstrate a significant improvement over previous algorithms. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | prediction algorithms | en_US |
dc.subject | IP blacklisting | en_US |
dc.subject | network security | en_US |
dc.subject | association rule mining | en_US |
dc.subject | data mining | en_US |
dc.subject | machine learning | en_US |
dc.title | A Robust Algorithm for Predicting Attacks Using Collaborative Security Logs | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.6688/JISE.202005_36(3).0008 | en_US |
dc.identifier.journal | JOURNAL OF INFORMATION SCIENCE AND ENGINEERING | en_US |
dc.citation.volume | 36 | en_US |
dc.citation.issue | 3 | en_US |
dc.citation.spage | 597 | en_US |
dc.citation.epage | 619 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000537594300008 | en_US |
dc.citation.woscount | 0 | en_US |
Appears in Collections: | Articles |