scholarly journals The Influences of Feature Sets on the Detection of Advanced Persistent Threats

Electronics ◽  
2021 ◽  
Vol 10 (6) ◽  
pp. 704
Author(s):  
Katharina Hofer-Schmitz ◽  
Ulrike Kleb ◽  
Branka Stojanović

This paper investigates the influences of different statistical network traffic feature sets on detecting advanced persistent threats. The selection of suitable features for detecting targeted cyber attacks is crucial to achieving high performance and to address limited computational and storage costs. The evaluation was performed on a semi-synthetic dataset, which combined the CICIDS2017 dataset and the Contagio malware dataset. The CICIDS2017 dataset is a benchmark dataset in the intrusion detection field and the Contagio malware dataset contains real advanced persistent threat (APT) attack traces. Several different combinations of datasets were used to increase variety in background data and contribute to the quality of results. For the feature extraction, the CICflowmeter tool was used. For the selection of suitable features, a correlation analysis including an in-depth feature investigation by boxplots is provided. Based on that, several suitable features were allocated into different feature sets. The influences of these feature sets on the detection capabilities were investigated in detail with the local outlier factor method. The focus was especially on attacks detected with different feature sets and the influences of the background on the detection capabilities with respect to the local outlier factor method. Based on the results, we could determine a superior feature set, which detected most of the malicious flows.

Author(s):  
Hitesh Yadav ◽  
Rita Chhikara ◽  
Charan Kumari

Background: Software Product Line is the group of multiple software systems which share the similar set of features with multiple variants. Feature model is used to capture and organize features used in different multiple organization. Objective: The objective of this research article is to obtain an optimized subset of features which are capable of providing high performance. Methods: In order to achieve the desired objective, two methods have been proposed. a) An improved objective function which is used to compute the contribution of each feature with weight based methodology. b) A hybrid model is employed to optimize the Software Product Line problem. Results: Feature sets varying in size from 100 to 1000 have been used to compute the performance of the Software Product Line. Conclusion: The results shows that proposed hybrid model outperforms the state of art metaheuristic algorithms.


Author(s):  
Hang Ren ◽  
Junmo Zhang ◽  
Yanhong Tong ◽  
Mingxin Zhang ◽  
Xiaoli Zhao ◽  
...  

Solar RRL ◽  
2021 ◽  
pp. 2100450
Author(s):  
Bing-Huang Jiang ◽  
Yi-Peng Wang ◽  
Yu-Wei Su ◽  
Jia-Fu Chang ◽  
Chu-Chen Chueh ◽  
...  

Metals ◽  
2020 ◽  
Vol 11 (1) ◽  
pp. 46
Author(s):  
Nur Izzah Nabilah Haris ◽  
Shafreeza Sobri ◽  
Yus Aniza Yusof ◽  
Nur Kartinee Kassim

Molecular dynamics (MD) simulation is a powerful tool to study the molecular level working mechanism of corrosion inhibitors in mitigating corrosion. In the past decades, MD simulation has emerged as an instrument to investigate the interactions at the interface between the inhibitor molecule and the metal surface. Combined with experimental measurement, theoretical examination from MD simulation delivers useful information on the adsorption ability and orientation of the molecule on the surface. It relates the microscopic characteristics to the macroscopic properties which enables researchers to develop high performance inhibitors. Although there has been vast growth in the number of studies that use molecular dynamic evaluation, there is still lack of comprehensive review specifically for corrosion inhibition of organic inhibitors on ferrous metal in acidic solution. Much uncertainty still exists on the approaches and steps in performing MD simulation for corrosion system. This paper reviews the basic principle of MD simulation along with methods, selection of parameters, expected result such as adsorption energy, binding energy and inhibitor orientation, and recent publications in corrosion inhibition studies.


2021 ◽  
Vol 54 (3) ◽  
pp. 1-36
Author(s):  
Syed Wasif Abbas Hamdani ◽  
Haider Abbas ◽  
Abdul Rehman Janjua ◽  
Waleed Bin Shahid ◽  
Muhammad Faisal Amjad ◽  
...  

Cyber threats have been growing tremendously in recent years. There are significant advancements in the threat space that have led towards an essential need for the strengthening of digital infrastructure security. Better security can be achieved by fine-tuning system parameters to the best and optimized security levels. For the protection of infrastructure and information systems, several guidelines have been provided by well-known organizations in the form of cybersecurity standards. Since security vulnerabilities incur a very high degree of financial, reputational, informational, and organizational security compromise, it is imperative that a baseline for standard compliance be established. The selection of security standards and extracting requirements from those standards in an organizational context is a tedious task. This article presents a detailed literature review, a comprehensive analysis of various cybersecurity standards, and statistics of cyber-attacks related to operating systems (OS). In addition to that, an explicit comparison between the frameworks, tools, and software available for OS compliance testing is provided. An in-depth analysis of the most common software solutions ensuring compliance with certain cybersecurity standards is also presented. Finally, based on the cybersecurity standards under consideration, a comprehensive set of minimum requirements is proposed for OS hardening and a few open research challenges are discussed.


IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 132980-132989
Author(s):  
Siyu Luan ◽  
Zonghua Gu ◽  
Leonid B. Freidovich ◽  
Lili Jiang ◽  
Qingling Zhao

2003 ◽  
Vol 83 (4) ◽  
pp. 695-712 ◽  
Author(s):  
Ronaldo F. Hashimoto ◽  
Edward.R. Dougherty ◽  
Marcel Brun ◽  
Zheng-Zheng Zhou ◽  
Michael L. Bittner ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document