Advertisement

Network Data Collection, Fusion, Mining and Analytics for Cyber Security

  • Zheng YanEmail author
Conference paper
  • 638 Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11806)

Abstract

Cyber security has become the most crucially important topic for safeguarding national and personal safety. Achieving cyber security depends not only on defense technologies, but also the technologies to detect and discover cyber intrusions, threats and attacks. Herein, network data plays an essential role. However, network data for security detection (i.e., security-related data) normally features big data characters. How to collect and process them in an efficient, effective and precise way becomes a big challenge towards network security measurement. In this article, I will introduce the current research results of my research team in terms of adaptive network data collection in heterogenous networks, data fusion and compression for highly efficient network intrusion detection and economic data storage, a method of application-layer tunnel detection with rules and machine learning, as well as data mining and analytics on opinions posted in the website for retrieving trust information and generating reputation. Working on security-related network data collection, fusion, mining and analytics, we make efforts to collect and process as few as possible data in a context-aware manner, but achieve as accurate as possible security detection results.

Keywords

Data collection Data fusion Data mining Data analytics Cyber security Machine learning 

Notes

Acknowledgement

This work is sponsored by the National Key Research and Development Program of China (Grant 2016YFB0800700), the NSFC (Grants 61672410, 61802293 and U1536202), National Postdoctoral Program for Innovative Talents (grant BX20180238), the Project funded by China Postdoctoral Science Foundation (grant 2018M633461), the open grant of the Tactical Data Link Lab (Grant CLDL- 20182119), and the Key Lab of Information Network Security (Grant C18614).

References

  1. 1.
    Jing, X.Y., Yan, Z., Pedrycz, W.: Security data collection and data analytics in the internet: a survey. IEEE Commun. Surv. Tutorials 21(1), 586–618 (2019)CrossRefGoogle Scholar
  2. 2.
    Xie, H.M., Yan, Z., Yao, Z., Atiquzzaman, M.: Data collection for security measurement in wireless sensor networks: a survey. IEEE Internet Things J. 6(2), 2205–2224 (2019)CrossRefGoogle Scholar
  3. 3.
    Liu, G., Yan, Z., Pedryczc, W.: Data collection for attack detection and security measurement in mobile ad hoc networks: a survey. J. Netw. Comput. Appl. 105, 105–122 (2018)CrossRefGoogle Scholar
  4. 4.
    He, L.M., Yan, Z., Atiquzzaman, M.: LTE/LTE-a network security data collection and analysis for security measurement: a survey. IEEE Access 6(1), 4220–4242 (2018)CrossRefGoogle Scholar
  5. 5.
    Yan, Z., Zhang, Y.Q., Choo, R.K.K., Xiang, Y.: Editorial: security measurements of cyber networks. Secur. Commun. Netw. 2018(6545314), 3 (2018)Google Scholar
  6. 6.
    Lin, H.Q., Yan, Z., Fu, Y.L.: Adaptive security-related data collection with context awareness. J. Netw. Comput. Appl. 126, 88–103 (2019)CrossRefGoogle Scholar
  7. 7.
    Lin, H.Q., Yan, Z., Chen, Y., Zhang, L.F.: A survey on network security-related data collection technologies. IEEE Access 6(1), 18345–18365 (2018)CrossRefGoogle Scholar
  8. 8.
    Zhou, D.H., Yan, Z., Fu, Y.L., Yao, Z.: A survey on network data collection. J. Netw. Comput. Appl. 116, 9–23 (2018)CrossRefGoogle Scholar
  9. 9.
    Jing, X.Y., Yan, Z., Liang, X.Q., Pedrycz, W.: Network traffic fusion and analysis against DDoS flooding attacks with a novel reversible sketch. Inf. Fusion 51, 100–113 (2019)CrossRefGoogle Scholar
  10. 10.
    Jing, X.Y., Zhao, J.J., Zheng, Q.H., Yan, Z., Pedrycz, W.: A reversible sketch-based method for detecting and mitigating amplification attacks. J. Netw. Comput. Appl. 142, 15–24 (2019)CrossRefGoogle Scholar
  11. 11.
    Yan, Z., Liu, J., Yang, L.T., Pedrycz, W.: Data fusion in heterogeneous networks. Inf. Fusion 53, 1–3 (2020)CrossRefGoogle Scholar
  12. 12.
    Ding, W.X., Jing, X.Y., Yan, Z., Yang, L.T.: A survey on data fusion in Internet of Things: towards secure and privacy-preserving fusion. Inf. Fusion 51, 129–144 (2019)CrossRefGoogle Scholar
  13. 13.
    Li, G.Q., Yan, Z., Fu, Y.L., Chen, H.L.: Data fusion for network intrusion detection: a review. Secur. Commun. Netw. 2018(8210614), 16 (2018)Google Scholar
  14. 14.
    Lin, H.Q., Liu, G., Yan, Z.: Detection of application-layer tunnels with rules and machine learning. In: The 12th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS2019), Atlanta, USA, July 2019Google Scholar
  15. 15.
    Yan, Z., Jing, X.Y., Pedrycz, W.: Fusing and mining opinions for reputation generation. Inf. Fusion 36, 172–184 (2017)CrossRefGoogle Scholar
  16. 16.
    Liu, D., Yan, Z., Ding, W.X., Atiquzzaman, M.: A survey on secure data analytics in edge computing. IEEE Internet of Things J. 6(3), 4946–4967 (2019)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.State Lab of ISN, School of Cyber EngineeringXidian UniversityXi’anChina
  2. 2.Department of Communications and NetworkingAalto UniversityEspooFinland

Personalised recommendations