

A Multi-Perspective and Multi-Level Analysis Framework in Network Security Situational Awareness |
Pages: 71-75 (6) | [Full Text] PDF (254 KB) |
M Azhagiri, A Rajesh, S Karthik |
Research Scholar St.Peters University, Avadi, Chennai-600054Professor/CSE C Abdul Hakeem College of Engineering and Technology, Melvisharam, Tamil Nadu 632509Associate Professor/IT V.M.K.V Engineering College, Salem, Tamil Nadu 636308 |
Abstract - Network Security Situation Awareness (NSSA) knowledge has been comprehensively studied in multi-data analyzing research these years. NSSA is a conception pertinent to assessing and showing the global and comprehensive situation of network security, so it requires people to collect all kinds of data and analysis for as many dimensions as possible in order to reflect the macroscopic pictures. For network security situation evaluation method has been provided, and it represents how to apply this method to NSSA. A multi-perspective and multi-level analysis framework for NSSA is presented to demonstrate the advantages and effectiveness by using this method. |
Index Terms - Situation Awareness, Multi-Level Analysis, Multi-Perspective Analysis, NSSA |
C itation - M Azhagiri, A Rajesh, S Karthik. "A Multi-Perspective and Multi-Level Analysis Framework in Network Security Situational Awareness ." International Journal of Computer Networks and Communications Security 5, no. 4 (2017): 71-75. |
Proposing A New Model to Improve Alert Detection in Intrusion Detection Systems |
Pages: 76-82 (7) | [Full Text] PDF (409 KB) |
BS Sheykhahmadloo, S Mehrnoosh |
Master of Software Engineering, Department of Computer Engineering, University of Isfahan, Isfahan, IranMaster of Software Engineering, Department of Computer Engineering, University of Shiraz, Shiraz, Iran |
Abstract - Using Intrusion Detection Systems is essential in todays systems to detect cyber attacks. IDS identify undesirable behaviors by getting information from systems that are under their surveillance and give them to network analyst as an Alert. A summary view of network security status is obtained by clustering and labeling alerts. Detection and quality of alerts are the two primary challenges of these systems. The number of IDS alerts is too much that the network analyst cant survey all of them. In this article, a method has been presented in which the above mentioned shortcoming will be reduced by semantic expansion of alerts information. We will show that semantic expansion of alerts information based on background knowledge before clustering step leads to a much better clustering. DARPA dataset is used to evaluate the proposed method. Alerts detection rate will be more than 96%, which is better than similar approaches. |
Index Terms - Semantic Expansion of Alerts, Clustering Alerts, Intrusion Detection Systems |
C itation - BS Sheykhahmadloo, S Mehrnoosh. "Proposing A New Model to Improve Alert Detection in Intrusion Detection Systems." International Journal of Computer Networks and Communications Security 5, no. 4 (2017): 76-82. |
Securing the SIP Communications with XML Security Mechanisms in VoIP Application |
Pages: 83-89 (6) | [Full Text] PDF (328 KB) |
A Handoura, D Bourget |
Laboratoire de l Informatique des Telecommunications Ecole Nationale Superieure des Telecommunications de Bretagne France |
Abstract - The intelligent network is a basis to establish and commercialize the services by the telecommunication network. Selling services and information by a network does not define solely a considerable increase of the sum of the information flowing by the network, but also a question of confidentiality and integrity. These papers discuss and proposes a methods based on the integration of signaling protocol SIP on IN for realize a procedure of client authentication and data confidentiality. |
Index Terms - IN, SIP, Threats, Security, XML, SOAP, VoIP |
C itation - A Handoura, D Bourget. "Securing the SIP Communications with XML Security Mechanisms in VoIP Application." International Journal of Computer Networks and Communications Security 5, no. 4 (2017): 83-89. |