2011 Sixth International Conference on Digital Information Management 2011
DOI: 10.1109/icdim.2011.6093323
|View full text |Cite
|
Sign up to set email alerts
|

Applying multi-correlation for improving forecasting in cyber security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…Variants of moving averages like exponential weighted moving average (EWMA) have been used on both autocorrelated and correlated data to detect intrusion 21 . Simple moving average and EWMA was used by Pontes et al 22 to forecast attacks for intrusion detection and prevention system. Various forecasting methods like simple moving average, weighted moving average, exponential smoothing, and linear regression have been used to predict a distributed denial of service attack's impact (intensity and size), with an error rate of less than 1% 23 .…”
Section: Related Workmentioning
confidence: 99%
“…Variants of moving averages like exponential weighted moving average (EWMA) have been used on both autocorrelated and correlated data to detect intrusion 21 . Simple moving average and EWMA was used by Pontes et al 22 to forecast attacks for intrusion detection and prevention system. Various forecasting methods like simple moving average, weighted moving average, exponential smoothing, and linear regression have been used to predict a distributed denial of service attack's impact (intensity and size), with an error rate of less than 1% 23 .…”
Section: Related Workmentioning
confidence: 99%
“…Forecasting methods such as [25], [26], [27] analyze network traffic. Where [25] is specific to predicting attacks using IPV4 packet traffic, and [26] looks at various network sensors at different layers to prevent unwanted Internet traffic, whereas [27] combines DNS traffic with security metadata such as number of policy violations and the number of clients in the network. Many researchers such as [28] based cyber prediction on open source information.…”
Section: B Predicting Cyber Attackmentioning
confidence: 99%
“…Due to their disruptive nature, predicting cyber attacks is an important research effort. Most research efforts focus on using network traffic for forecasting as in [19], [20]. These methods leverage network traffic or sensors at different layers as the underlying data to forecasting models.…”
Section: Related Workmentioning
confidence: 99%