{"id":521,"date":"2022-11-27T23:03:41","date_gmt":"2022-11-27T23:03:41","guid":{"rendered":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/?p=521"},"modified":"2022-12-11T21:39:25","modified_gmt":"2022-12-11T21:39:25","slug":"intrusion-detection","status":"publish","type":"post","link":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/2022\/11\/27\/intrusion-detection\/","title":{"rendered":"Intrusion Detection and Security Operation Centers (SOCs)"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.18.0&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#000000&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<ul>\n<li><span style=\"font-size: medium\">W. A. Yousef, I. Traore and W. Briguglio, &#8220;Classifier Calibration: with application to threat scores in cybersecurity\u201d, IEEE Transactions on Dependable and Secure Computing, doi: 10.1109\/TDSC.2022.3170011., April 2022<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Waleed Yousef, Issa Traore, William Briguglio, \u201cUN-AVOIDS: Unsupervised and Nonparametric Approach for Visualizing Outliers and Invariant Detection Scoring\u201d, IEEE Transactions on Information Forensics and Security, Volume 16, Pages: 5195 &#8211; 5210, 2021.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">C. Nie, P. G. Quinan, I. Traor\u00e9 and I. Woungang, &#8220;Intrusion Detection using a Graphical Fingerprint Model,&#8221; 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing (CCGrid), Taormina, Italy, 16-19 May 2022, pp. 806-813, doi: 10.1109\/CCGrid54584.2022.00095<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Paulo Gustavo Quinan, Issa Traore, Ujwal Reddy Ghondi, Isaac Woungang, \u201cUnsupervised Anomaly Detection using a new Knowledge Graph Model for Network Activity and Events\u201d, 4th International Conference on Machine Learning for Networking (MLN), 2021, Paris, France. In: Renault, \u00c9., Boumerdassi, S., M\u00fchlethaler, P. (eds) Machine Learning for Networking. MLN 2021. Lecture Notes in Computer Science, vol 13175. Springer, Cham. pp 117\u2013130.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Nwamuo O., de Faria Quinan P.M., Traore I., Woungang I., Aldribi A., \u201cArguments Against Using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative\u201d. In: Boumerdassi S., Renault \u00c9., M\u00fchlethaler P. (eds) Machine Learning for Networking. MLN 2019. Lecture Notes in Computer Science, vol 12081. Springer, Cham<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Nitika Gupta, Issa Traore, Paulo Magella Faria de Quinan, \u201cAutomated Event Prioritization for Security Operation Center using Deep Learning\u201d, 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, USA, 9-12 Dec. 2019.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Sherif Saad; Issa Traore; Marcelo Luiz Brocardo.\u00a0&#8220;<a href=\"http:\/\/ieeexplore.ieee.org\/xpl\/login.jsp?tp=&amp;arnumber=7064620&amp;url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D7064620\" target=\"_blank\" rel=\"noopener\">Context-aware intrusion alerts verification approach<\/a>&#8220;, 10th International Conference on Information Assurance and Security (IAS), Okinawa, Japan, Nov 28-30, 2014.<\/span><\/li>\n<li><span style=\"font-size: medium\">W. Lu and I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/intrusion-detection\/IJICS-6.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;Unsupervised anomaly detection using an evolutionary extension of k-means algorithm&#8221;<\/a>, International Journal on Information and Computer Security (IJICS), Volume 2, Issue 2, pp. 107-139, May-Aug 2008.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">W. Lu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/intrusion-detection\/WSEAS-trans-7.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;A genetic EM algorithm for learning the optimal number of components of mixture models&#8221;<\/a>, WSEAS Transactions on Computers, Issue 9, Vol. 5, September 2006, pp. 1795-1803 (9 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">W. Lu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/intrusion-detection\/WSEAS-conf-8.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;A novel evolutionary clustering algorithm based on Gaussian mixture model&#8221;<\/a>, Proceedings of the 10th WSEAS International Conference on Computers, ID. 534-365, Vouliagmeni, Athens, Greece, July 13-15, 2006.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. Khan and I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/WorkShops\/IAW.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;Queue based analysis of DoS attacks&#8221;<\/a>, Proceedings of the sixth IEEE Systems, Man and Cybernetics Information Assurance Workshop, June 2005, pp. 266-273.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Khan, S., and I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/conferences\/DIMVA.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;A prevention model for algorithmic complexity attacks&#8221;<\/a>, Conference on Detection of Intrusions and Malware &amp; Vulnerability Assessment (DIMVA), Vienna, Austria, July 7-8, 2005, Lecture Notes in Computer Science (LNCS), Springer, K. Julisch and C. Kruegel (Eds.), LNCS 3548, pp. 160-173, 2005.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">W. Lu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/conferences\/Lu-CIMCA05.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;A new evolutionary algorithm for determining the optimal number of clusters&#8221;<\/a>, IEEE International Conference on Computational Intelligence for Modeling, Control and Automation (CIMCA), 28-30 November 2005, Vienna \u2013 Austria.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">W. Lu and I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/conferences\/Lu-PACRIM05.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;An unsupervised approach for detecting DDOS attacks based on traffic-based metrics&#8221;<\/a>, IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, Pages: 462-465, Victoria, BC, August 2005.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">W. Lu and I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/reports\/Lu-ECEReport05-2.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;An unsupervised anomaly detection framework for network intrusions&#8221;<\/a>, Technical Report ECE-05-2, Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, October 2005.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">W. Lu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/conferences\/Lu-ICTAI05.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;Determining the optimal number of clusters using a new evolutionary algorithm&#8221;<\/a>, 17th IEEE International Conference on Tools with Artificial Intelligence, 14-16 November, Hong-Kong.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">W. Lu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/conferences\/Lu-CANS05.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;A novel unsupervised anomaly detection framework for detecting network attacks in real-time&#8221;<\/a>, 4th International Conference on Cryptology and Network Security (CANS), Xiamen, Fujian Province, China, 14-16 December, 2005, Lecture Notes in Computer Science, Vol. 3810, Pages: 96-109, ISBN 3-540-30849-0, Springer, 2005, Y.G Desmedt et al. (Eds.).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">W. Lu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/journals\/coi-2004.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;Detecting new forms of network intrusions using genetic programming&#8221;<\/a>, Computational Intelligence, Vol. 20, No. 3, pp. 475-494, Aug. 2004, Blackwell Publishing, Boston MA &amp; Oxford UK.<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>W. A. Yousef, I. Traore and W. Briguglio, &#8220;Classifier Calibration: with application to threat scores in cybersecurity\u201d, IEEE Transactions on Dependable and Secure Computing, doi: 10.1109\/TDSC.2022.3170011., April 2022 Waleed Yousef, Issa Traore, William Briguglio, \u201cUN-AVOIDS: Unsupervised and Nonparametric Approach for Visualizing Outliers and Invariant Detection Scoring\u201d, IEEE Transactions on Information Forensics and Security, Volume 16, [&hellip;]<\/p>\n","protected":false},"author":17669,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<h1 id=\"PageTopHeading\">\u00a0<\/h1><ul><li>W. A. Yousef, I. Traore and W. Briguglio, \"Classifier Calibration: with application to threat scores in cybersecurity\u201d, IEEE Transactions on Dependable and Secure Computing, doi: 10.1109\/TDSC.2022.3170011., April 2022<\/li><li>Waleed Yousef, Issa Traore, William Briguglio, \u201cUN-AVOIDS: Unsupervised and Nonparametric Approach for Visualizing Outliers and Invariant Detection Scoring\u201d, IEEE Transactions on Information Forensics and Security, Volume 16, Pages: 5195 - 5210, 2021.<\/li><li>C. Nie, P. G. Quinan, I. Traor\u00e9 and I. Woungang, \"Intrusion Detection using a Graphical Fingerprint Model,\" 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing (CCGrid), Taormina, Italy, 16-19 May 2022, pp. 806-813, doi: 10.1109\/CCGrid54584.2022.00095<\/li><li>Paulo Gustavo Quinan, Issa Traore, Ujwal Reddy Ghondi, Isaac Woungang, \u201cUnsupervised Anomaly Detection using a new Knowledge Graph Model for Network Activity and Events\u201d, 4th International Conference on Machine Learning for Networking (MLN), 2021, Paris, France. In: Renault, \u00c9., Boumerdassi, S., M\u00fchlethaler, P. (eds) Machine Learning for Networking. MLN 2021. Lecture Notes in Computer Science, vol 13175. Springer, Cham. pp 117\u2013130.<\/li><li>Nwamuo O., de Faria Quinan P.M., Traore I., Woungang I., Aldribi A., \u201cArguments Against Using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative\u201d. In: Boumerdassi S., Renault \u00c9., M\u00fchlethaler P. (eds) Machine Learning for Networking. MLN 2019. Lecture Notes in Computer Science, vol 12081. Springer, Cham<\/li><li>Nitika Gupta, Issa Traore, Paulo Magella Faria de Quinan, \u201cAutomated Event Prioritization for Security Operation Center using Deep Learning\u201d, 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, USA, 9-12 Dec. 2019.<\/li><li>Sherif Saad; Issa Traore; Marcelo Luiz Brocardo.\u00a0\"<a href=\"http:\/\/ieeexplore.ieee.org\/xpl\/login.jsp?tp=&arnumber=7064620&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D7064620\" target=\"_blank\" rel=\"noopener\">Context-aware intrusion alerts verification approach<\/a>\", 10th International Conference on Information Assurance and Security (IAS), Okinawa, Japan, Nov 28-30, 2014.<\/li><li>W. Lu and I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/intrusion-detection\/IJICS-6.pdf\" target=\"_blank\" rel=\"noopener\">\"Unsupervised anomaly detection using an evolutionary extension of k-means algorithm\"<\/a>, International Journal on Information and Computer Security (IJICS), Volume 2, Issue 2, pp. 107-139, May-Aug 2008.<\/li><li>W. Lu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/intrusion-detection\/WSEAS-trans-7.pdf\" target=\"_blank\" rel=\"noopener\">\"A genetic EM algorithm for learning the optimal number of components of mixture models\"<\/a>, WSEAS Transactions on Computers, Issue 9, Vol. 5, September 2006, pp. 1795-1803 (9 pages).<\/li><li>W. Lu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/intrusion-detection\/WSEAS-conf-8.pdf\" target=\"_blank\" rel=\"noopener\">\"A novel evolutionary clustering algorithm based on Gaussian mixture model\"<\/a>, Proceedings of the 10th WSEAS International Conference on Computers, ID. 534-365, Vouliagmeni, Athens, Greece, July 13-15, 2006.<\/li><li>S. Khan and I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/WorkShops\/IAW.pdf\" target=\"_blank\" rel=\"noopener\">\"Queue based analysis of DoS attacks\"<\/a>, Proceedings of the sixth IEEE Systems, Man and Cybernetics Information Assurance Workshop, June 2005, pp. 266-273.<\/li><li>Khan, S., and I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/conferences\/DIMVA.pdf\" target=\"_blank\" rel=\"noopener\">\"A prevention model for algorithmic complexity attacks\"<\/a>, Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Vienna, Austria, July 7-8, 2005, Lecture Notes in Computer Science (LNCS), Springer, K. Julisch and C. Kruegel (Eds.), LNCS 3548, pp. 160-173, 2005.<\/li><li>W. Lu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/conferences\/Lu-CIMCA05.pdf\" target=\"_blank\" rel=\"noopener\">\"A new evolutionary algorithm for determining the optimal number of clusters\"<\/a>, IEEE International Conference on Computational Intelligence for Modeling, Control and Automation (CIMCA), 28-30 November 2005, Vienna \u2013 Austria.<\/li><li>W. Lu and I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/conferences\/Lu-PACRIM05.pdf\" target=\"_blank\" rel=\"noopener\">\"An unsupervised approach for detecting DDOS attacks based on traffic-based metrics\"<\/a>, IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, Pages: 462-465, Victoria, BC, August 2005.<\/li><li>W. Lu and I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/reports\/Lu-ECEReport05-2.pdf\" target=\"_blank\" rel=\"noopener\">\"An unsupervised anomaly detection framework for network intrusions\"<\/a>, Technical Report ECE-05-2, Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, October 2005.<\/li><li>W. Lu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/conferences\/Lu-ICTAI05.pdf\" target=\"_blank\" rel=\"noopener\">\"Determining the optimal number of clusters using a new evolutionary algorithm\"<\/a>, 17th IEEE International Conference on Tools with Artificial Intelligence, 14-16 November, Hong-Kong.<\/li><li>W. Lu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/conferences\/Lu-CANS05.pdf\" target=\"_blank\" rel=\"noopener\">\"A novel unsupervised anomaly detection framework for detecting network attacks in real-time\"<\/a>, 4th International Conference on Cryptology and Network Security (CANS), Xiamen, Fujian Province, China, 14-16 December, 2005, Lecture Notes in Computer Science, Vol. 3810, Pages: 96-109, ISBN 3-540-30849-0, Springer, 2005, Y.G Desmedt et al. (Eds.).<\/li><li>W. Lu, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/journals\/coi-2004.pdf\" target=\"_blank\" rel=\"noopener\">\"Detecting new forms of network intrusions using genetic programming\"<\/a>, Computational Intelligence, Vol. 20, No. 3, pp. 475-494, Aug. 2004, Blackwell Publishing, Boston MA & Oxford UK.<\/li><\/ul>","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5,4],"tags":[],"class_list":["post-521","post","type-post","status-publish","format-standard","hentry","category-by-area","category-publications"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/521","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/users\/17669"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/comments?post=521"}],"version-history":[{"count":7,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/521\/revisions"}],"predecessor-version":[{"id":1145,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/521\/revisions\/1145"}],"wp:attachment":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/media?parent=521"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/categories?post=521"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/tags?post=521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}