2010 Fifth International Conference on Digital Information Management (ICDIM) 2010
DOI: 10.1109/icdim.2010.5664238
|View full text |Cite
|
Sign up to set email alerts
|

Fibonacci sequence and EWMA for intrusion forecasting system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
19
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(19 citation statements)
references
References 15 publications
0
19
0
Order By: Relevance
“…Regarding DDoS attacks, it is expected these attacks to become more common against independent media and human rights sites in 2011, as the recent highly publicized DDoS attacks on Wikileaks, and "Operation Payback" attacks by "Anonymous" on sites perceived to oppose Wikileaks (Zuckerman et al, 2010). According to (Pontes et al, 2008), (Pontes & Guelfi, 2009a), (Pontes & Guelfi, 2009b), (Pontes & Zucchi, 2010), an early warning system showing a future trend outlook with an increasing number of cyber-attacks, exposed by forecasting analysis, may influence decisions on the security devices adoption (e.g. rules in IDPS combined with rules in firewalls) before incidents happen, according to the needs.…”
Section: Analogy With Forecasting In Cyber Securitymentioning
confidence: 99%
See 4 more Smart Citations
“…Regarding DDoS attacks, it is expected these attacks to become more common against independent media and human rights sites in 2011, as the recent highly publicized DDoS attacks on Wikileaks, and "Operation Payback" attacks by "Anonymous" on sites perceived to oppose Wikileaks (Zuckerman et al, 2010). According to (Pontes et al, 2008), (Pontes & Guelfi, 2009a), (Pontes & Guelfi, 2009b), (Pontes & Zucchi, 2010), an early warning system showing a future trend outlook with an increasing number of cyber-attacks, exposed by forecasting analysis, may influence decisions on the security devices adoption (e.g. rules in IDPS combined with rules in firewalls) before incidents happen, according to the needs.…”
Section: Analogy With Forecasting In Cyber Securitymentioning
confidence: 99%
“…In other hand, security alerts are types of security events, indicating anomalous activities or cyber attacks . In our earlier works we proposed the Distributed Intrusion Forecasting System (DIFS) , (Pontes & Zucchi, 2010), which covered the following gaps of today's forecasting techniques in IDPS: a) the use of few sensors and/or sensors employed locally for capturing data; b) the use of just one forecasting technique; and c) lack of information sharing among sensors to be used for correlation. Notwithstanding, we faced huge amount of alerts which could have negative influence over forecasting results.…”
Section: Analogy With Forecasting In Cyber Securitymentioning
confidence: 99%
See 3 more Smart Citations