Skip to main content

Network Data Collection, Fusion, Mining and Analytics for Cyber Security

  • Conference paper
  • First Online:
Machine Learning for Cyber Security (ML4CS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11806))

Included in the following conference series:

Abstract

Cyber security has become the most crucially important topic for safeguarding national and personal safety. Achieving cyber security depends not only on defense technologies, but also the technologies to detect and discover cyber intrusions, threats and attacks. Herein, network data plays an essential role. However, network data for security detection (i.e., security-related data) normally features big data characters. How to collect and process them in an efficient, effective and precise way becomes a big challenge towards network security measurement. In this article, I will introduce the current research results of my research team in terms of adaptive network data collection in heterogenous networks, data fusion and compression for highly efficient network intrusion detection and economic data storage, a method of application-layer tunnel detection with rules and machine learning, as well as data mining and analytics on opinions posted in the website for retrieving trust information and generating reputation. Working on security-related network data collection, fusion, mining and analytics, we make efforts to collect and process as few as possible data in a context-aware manner, but achieve as accurate as possible security detection results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jing, X.Y., Yan, Z., Pedrycz, W.: Security data collection and data analytics in the internet: a survey. IEEE Commun. Surv. Tutorials 21(1), 586–618 (2019)

    Article  Google Scholar 

  2. Xie, H.M., Yan, Z., Yao, Z., Atiquzzaman, M.: Data collection for security measurement in wireless sensor networks: a survey. IEEE Internet Things J. 6(2), 2205–2224 (2019)

    Article  Google Scholar 

  3. Liu, G., Yan, Z., Pedryczc, W.: Data collection for attack detection and security measurement in mobile ad hoc networks: a survey. J. Netw. Comput. Appl. 105, 105–122 (2018)

    Article  Google Scholar 

  4. He, L.M., Yan, Z., Atiquzzaman, M.: LTE/LTE-a network security data collection and analysis for security measurement: a survey. IEEE Access 6(1), 4220–4242 (2018)

    Article  Google Scholar 

  5. Yan, Z., Zhang, Y.Q., Choo, R.K.K., Xiang, Y.: Editorial: security measurements of cyber networks. Secur. Commun. Netw. 2018(6545314), 3 (2018)

    Google Scholar 

  6. Lin, H.Q., Yan, Z., Fu, Y.L.: Adaptive security-related data collection with context awareness. J. Netw. Comput. Appl. 126, 88–103 (2019)

    Article  Google Scholar 

  7. Lin, H.Q., Yan, Z., Chen, Y., Zhang, L.F.: A survey on network security-related data collection technologies. IEEE Access 6(1), 18345–18365 (2018)

    Article  Google Scholar 

  8. Zhou, D.H., Yan, Z., Fu, Y.L., Yao, Z.: A survey on network data collection. J. Netw. Comput. Appl. 116, 9–23 (2018)

    Article  Google Scholar 

  9. Jing, X.Y., Yan, Z., Liang, X.Q., Pedrycz, W.: Network traffic fusion and analysis against DDoS flooding attacks with a novel reversible sketch. Inf. Fusion 51, 100–113 (2019)

    Article  Google Scholar 

  10. Jing, X.Y., Zhao, J.J., Zheng, Q.H., Yan, Z., Pedrycz, W.: A reversible sketch-based method for detecting and mitigating amplification attacks. J. Netw. Comput. Appl. 142, 15–24 (2019)

    Article  Google Scholar 

  11. Yan, Z., Liu, J., Yang, L.T., Pedrycz, W.: Data fusion in heterogeneous networks. Inf. Fusion 53, 1–3 (2020)

    Article  Google Scholar 

  12. Ding, W.X., Jing, X.Y., Yan, Z., Yang, L.T.: A survey on data fusion in Internet of Things: towards secure and privacy-preserving fusion. Inf. Fusion 51, 129–144 (2019)

    Article  Google Scholar 

  13. Li, G.Q., Yan, Z., Fu, Y.L., Chen, H.L.: Data fusion for network intrusion detection: a review. Secur. Commun. Netw. 2018(8210614), 16 (2018)

    Google Scholar 

  14. Lin, H.Q., Liu, G., Yan, Z.: Detection of application-layer tunnels with rules and machine learning. In: The 12th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS2019), Atlanta, USA, July 2019

    Google Scholar 

  15. Yan, Z., Jing, X.Y., Pedrycz, W.: Fusing and mining opinions for reputation generation. Inf. Fusion 36, 172–184 (2017)

    Article  Google Scholar 

  16. Liu, D., Yan, Z., Ding, W.X., Atiquzzaman, M.: A survey on secure data analytics in edge computing. IEEE Internet of Things J. 6(3), 4946–4967 (2019)

    Article  Google Scholar 

Download references

Acknowledgement

This work is sponsored by the National Key Research and Development Program of China (Grant 2016YFB0800700), the NSFC (Grants 61672410, 61802293 and U1536202), National Postdoctoral Program for Innovative Talents (grant BX20180238), the Project funded by China Postdoctoral Science Foundation (grant 2018M633461), the open grant of the Tactical Data Link Lab (Grant CLDL- 20182119), and the Key Lab of Information Network Security (Grant C18614).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zheng Yan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yan, Z. (2019). Network Data Collection, Fusion, Mining and Analytics for Cyber Security. In: Chen, X., Huang, X., Zhang, J. (eds) Machine Learning for Cyber Security. ML4CS 2019. Lecture Notes in Computer Science(), vol 11806. Springer, Cham. https://doi.org/10.1007/978-3-030-30619-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30619-9_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30618-2

  • Online ISBN: 978-3-030-30619-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics