Submitted:
31 July 2025
Posted:
01 August 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
3. Understanding Zero-Trust Architecture
- Continuous verification of identities and devices.
- Enforcement of least-privilege access.
- Micro-segmentation of networks and workloads.
- Real-time risk analysis and policy adjustment.
- Monitoring and logging all user and application activity.
4. The Concept of Symmetry in Cybersecurity
5. Incorporating Symmetry into Zero-Trust Models
- 6.
- To build and validate experimental prototypes using simulated environments, with focus on testing symmetry-enhanced ZTA implementations, CTI ingestion pipelines, and automated decision-making modules.
- 7.
- To investigate the ethical, operational, and scalability considerations associated with deploying symmetry-driven security models in real-world organizations.
7. Methodology
- Data Layer: CTI feeds, logs, user behavior analytics, and vulnerability databases [118].
- Processing Layer: AI and ML components for pattern identification, anomaly scoring, and trust recalibration [119].
- Decision Layer: Policy engines governed by symmetrical logic that adapt rules based on proportional risk [120].
- Interface Layer: Visual analytics dashboards and RESTful APIs to support threat analysts and automation systems [121].
- Accuracy of threat detection and trust scoring [128].
- Symmetry Index, a custom metric to measure the proportionality of defense-response actions [129].
- System Resilience, gauged by time to detection, success rate of containment, and false-positive reduction [130].
- Adaptability, defined by the system’s capacity to recalibrate policies in response to changing threat patterns [131].
8. Laboratory Simulation Design
8.1. Environmental Architecture
8.2. Data Generation and Injection
8.3. Component Deployment
- Threat Intelligence Pipeline: Modules compatible with STIX/TAXII that feed a Neo4j-supported knowledge graph [142].
- Decision Engines: Trust engines utilizing rules and machine learning, implemented with Scikit-learn, TensorFlow, and PyTorch [143].
- Policy Orchestration: OPA (Open Policy Agent) integrated with Kubernetes Admission Controllers to enforce dynamic policies [144].
- Monitoring and Logging: Elasticsearch, Logstash, and Kibana (ELK Stack) for observability and forensic analysis [145].
8.4. Evaluation Scenarios
- Credential Misuse Detection – Evaluating symmetric policy escalation when leaked credentials are reused from anomalous geolocations.
- Lateral Movement Attempts – Validating microsegmentation response symmetry in East-West traffic analysis.
- Insider Threats – Detecting role-inconsistent behavior using behavioral symmetry baselines.
- Polymorphic Malware Injection – Assessing detection and containment through symmetrical response adaptation based on adversarial morphology.
8.5. Metrics and Analysis
- Detection Rate (TPR) and False Positive Rate (FPR) for accuracy.
- Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) for responsiveness.
- Symmetry Coefficient (SC): Ratio of response granularity to threat severity [146].
- System Overhead (%) introduced by real-time policy recalibration.
9. Experiment Results
9.1. Detection and Trust Evaluation Performance
9.2. Resource Utilization and Overhead
9.3. Patents
- SC = 1.03 for credential misuse
- SC = 1.10 for insider threats
- SC = 0.92 for polymorphic malware attacks
9.4. Comparison with Baseline ZTA Implementation
- 27% faster average detection time (MTTD)
- 34% fewer false positives
- 41% higher policy adaptation accuracy
9.5. Summary of Findings
10. Discussion of Findings
11.3. Sharing and Trust Barriers
11.4. Threat Attribution and Validation
11.5. Integration into Operational Workflows
11.6.6. Ethical and Legal Constraints
11.7.7. Asymmetric Application Across Sectors
12. Strategic Implications for Symmetry in CTI
12.1.1.1. Improving Situational Awareness
12.3.3. Guiding Dynamic Policy Development
12.4.4. Reducing Cognitive Load in SOCs
12.5. Cross-Sectoral Adoption and Interoperability
12.6. Enabling Proactive and Preventive Postures
13. Conclusions and Future Work
- Adaptive symmetry-driven ontologies to support threat-data normalization.
- Hybrid AI models that combine symbolic reasoning with neural networks to better model symmetrical relationships.
- Explainable AI methods for symmetric trust scoring in high-stakes environments.
- Ethical guidelines for equitable CTI sharing and response alignment.
Funding
Data Availability Statement
Conflicts of Interest
References
- Conti, M.; Dehghantanha, A.; Franke, K.; Watson, S. Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems 2018, 78, 544–546. [Google Scholar] [CrossRef]
- NIST. In Zero Trust Architecture; NIST Special Publication 800-207; 2020.
- Shostack, A. Threat Modeling: Designing for Security; Wiley, 2014. [Google Scholar]
- Sabottke, M.; Sappenfield, B.; Li, Y. Vulnerability disclosure and exploit availability: An empirical analysis of markets. in Proc. of the WEIS; 2015. [Google Scholar]
- MITRE. ATT&CK Framework. https://attack.mitre.org/ accessed Jul. 2025.
- Ullrich, J. The SANS Internet Storm Center: Threat intelligence sharing. SANS Institute, 2021. [Google Scholar]
- Mitchell, R.; Chen, I. A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. 2014, 46. [Google Scholar] [CrossRef]
- X-Force, I.B. Threat Intelligence Index. 2023.
- Bertino, E.; Takahashi, K. Identity Management: Concepts, Technologies, and Systems; Artech House, 2011. [Google Scholar]
- Zuech, S.; Khoshgoftaar, T.M.; Wald, R. Intrusion detection and Big Heterogeneous Data: a survey. J. Big Data 2015, 2. [Google Scholar] [CrossRef]
- Denning, D.E. An intrusion-detection model. In IEEE Trans. Softw. Eng.; 1987; Volume -1SE3, pp. 222–232. [Google Scholar]
- Bishop, M. Computer Security: Art and Science; Addison-Wesley, 2003. [Google Scholar]
- Khraisat, A.; et al. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2019, 2. [Google Scholar] [CrossRef]
- ENISA, “Threat Landscape 2023,” European Union Agency for Cybersecurity, 2023.
- Saltzer, J.H.; Schroeder, M.D. The protection of information in computer systems. Proc. IEEE 1975, 63, 1278–1308. [Google Scholar] [CrossRef]
- Project, M.I.P. Malware Information Sharing Platform and Threat Sharing. https://www.misp-project.
- Wool, A. Trends in firewall configuration errors: Measuring the holes in Swiss cheese. IEEE Internet Comput. 2010, 14. [Google Scholar] [CrossRef]
- Wicker, S.B.; Bhargava, V.K. (Eds.) Reed-Solomon Codes and Their Applications; Wiley, 1999. [Google Scholar]
- Heberlein, L.T.; et al. A network security monitor. IEEE Symposium on Research in Security and Privacy; 1990. [Google Scholar]
- Geer, D.; et al. Cybersecurity and national policy. IEEE Secur. Priv. 2014, 12, 16–23. [Google Scholar]
- Peng, T.; Leckie, C.; Ramamohanarao, K. Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Computing Surveys 2007, 39, 3. [Google Scholar] [CrossRef]
- Mell, P.; Grance, T. The NIST definition of cloud computing. NIST Special Publication 800-145, Sept. 2011. [Google Scholar]
- Langner, R. Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security & Privacy 2011, 9, 49–51. [Google Scholar] [CrossRef]
- Lyon, G. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning; Insecure.Com LLC, 2009. [Google Scholar]
- Axelsson, S. Intrusion detection systems: A survey and taxonomy; Tech. Rep. 99-15; Dept. of Computer Engineering, Chalmers University, 2000. [Google Scholar]
- Tankard, C. Advanced persistent threats and how to monitor and deter them. Network Security 2011, 2011, 16–19. [Google Scholar] [CrossRef]
- Schneier, B. Applied Cryptography; John Wiley & Sons, 1996. [Google Scholar]
- Boneh, D.; Shoup, V. A Graduate Course in Applied Cryptography; 2020. [Google Scholar]
- Cisco. Zero Trust: Going Beyond the Perimeter. White Paper, 2021.
- Google. BeyondCorp: A New Approach to Enterprise Security. 2014.
- Garcia, M.; Dahn, K. A comprehensive guide to Zero Trust security. SANS Institute Whitepaper, 2021. [Google Scholar]
- Kindervag, J. Build security into your network’s DNA: The Zero Trust network architecture. Forrester Research, 2010. [Google Scholar]
- Andress, J. The Basics of Information Security, 2nd ed.; Syngress, 2014. [Google Scholar]
- Latham, A.; Oppenheimer, E. AI for CTI: Machine learning applications in threat intelligence. Journal of Cybersecurity 2023, 8. [Google Scholar]
- Bilar, D. Opcodes as predictor for malware. International Journal of Electronic Security and Digital Forensics 2007, 1. [Google Scholar] [CrossRef]
- Sommer, R.; Paxson, V. Outside the closed world: On using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy, 2010. [Google Scholar]
- Debar, H.; Dacier, M.; Wespi, A. A revised taxonomy for intrusion-detection systems. Annales des Télécommunications 2000, 55. [Google Scholar] [CrossRef]
- Alberts, C.; Dorofee, A. , Managing Information Security Risks: The OCTAVE Approach; Addison-Wesley, 2003. [Google Scholar]
- Reason, J. , Managing the Risks of Organizational Accidents; Ashgate Publishing, 1997. [Google Scholar]
- Krotofil, M.; Gollmann, D. Industrial control systems security: What is happening?” in Industrial Control Systems Security; Springer, 2015. [Google Scholar]
- Hutchins, E.M.; Cloppert, M.J.; Amin, R.M. Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues in Information Warfare & Security Research 2011, 1, 80–106. [Google Scholar]
- Patel, A.; et al. An intrusion detection and prevention system in cloud computing: A systematic review. Journal of Network and Computer Applications 2013, 36, 25–41. [Google Scholar] [CrossRef]
- Goodall, J.R.; Lutters, W.G.; Komlodi, A. The work of intrusion detection: Rethinking the role of security analysts. in Proc. of the ACM Conf. on Computer Supported Cooperative Work; 2004. [Google Scholar]
- Wu, S.X.; Banzhaf, W. The use of computational intelligence in intrusion detection systems: A review. Applied Soft Computing 2010, 10, 1–35. [Google Scholar] [CrossRef]
- Mukherjee, B.; Heberlein, L.T.; Levitt, K.N. Network intrusion detection. IEEE Network 1994, 8, 26–41. [Google Scholar] [CrossRef]
- Mulligan, D.K.; King, J. Bridging the gap between privacy and security. University of Chicago Law Review 2007, 74, 1017–1037. [Google Scholar]
- Tankard, C. Big data security. Network Security 2012, 2012, 5–8. [Google Scholar] [CrossRef]
- Kim, H.J.; Kim, Y.H. A new approach to intrusion detection system using artificial neural networks and fuzzy logic. IJCSNS 2006, 6. [Google Scholar]
- Ghosh, A.; Turrini, A. Cyber-insurance: A survey. Computer Science Review 2020, 37. [Google Scholar]
- Juels, A.; Rivest, R.L. Honeywords: Making password-cracking detectable. in Proc. of the ACM Conf. on Computer and Communications Security (CCS); 2013. [Google Scholar]
- Scarfone, K.; Mell, P. Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Special Publication 800-94, 2007. [Google Scholar]
- Ortlieb, A.; Kloft, M. Machine learning for dynamic malware analysis: A survey. ACM Computing Surveys 2021, 53, 1–36. [Google Scholar]
- Heckerman, D. A tutorial on learning with Bayesian networks. in Innovations in Bayesian Networks 2008, 156, 33–82. [Google Scholar]
- Bengio, Y.; Courville, A.; Vincent, P. Representation learning: A review and new perspectives. IEEE Trans. on PAMI 2013, 35, 1798–1828. [Google Scholar] [CrossRef]
- Kim, H.; Park, J. Security in the Internet of Things: A review. IEEE Internet of Things Journal 2017, 4, 1350–1358. [Google Scholar]
- Abomhara, M.; Køien, G.M. Security and privacy in the Internet of Things: Current status and open issues. in PRISMS, 2014. PRISMS; 2014. [Google Scholar]
- Roman, M.; et al. A middleware infrastructure for active spaces. IEEE Pervasive Computing 2002, 1, 74–83. [Google Scholar] [CrossRef]
- Macal, C.M.; North, M.J. Tutorial on agent-based modelling and simulation. Journal of Simulation 2010, 4, 151–162. [Google Scholar] [CrossRef]
- Baldini, G.; et al. Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead. IEEE Communications Surveys & Tutorials 2012, 14, 355–379. [Google Scholar]
- Baldini, G.; et al. Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead. IEEE Communications Surveys & Tutorials 2012, 14, 355–379. [Google Scholar]
- Park, Y.; Lee, J.; Lee, S. Anomaly detection with machine learning for cyber security. Journal of Supercomputing 2021, 77, 12349–12372. [Google Scholar]
- Rokach, L.; Maimon, O. Data mining with decision trees: Theory and applications; World Scientific, 2014. [Google Scholar]
- Cardenas, A.A.; Baras, J.S.; Ramezani, V. Distributed change detection for intrusion detection systems. IEEE Int. Conf. on Intelligent Sensors, Sensor Networks and Information; 2004. [Google Scholar]
- Barrett, D.J.; Silverman, R.E. SSH,The Secure Shell: The Definitive Guide; O’Reilly Media, 2001. [Google Scholar]
- Francois, J.; Abdelnur, H.; Engel, T.; State, R. BotTrack: Tracking botnets using NetFlow and PageRank. IFIP/IEEE International Symposium on Integrated Network Management; 2011. [Google Scholar]
- Huxley, T.H.; Hamer, R.D. Policy conflict analysis for role-based access control. in Proc. of the ACM Workshop on Role-Based Access Control; 2002. [Google Scholar]
- Stamp, M. Information Security: Principles and Practice; Wiley, 2011. [Google Scholar]
- Vigna, G.; Kemmerer, R.A.; Porras, P.A. Anomaly detection: From intrusion detection to self-protection systems. Communications of the ACM 2005, 48, 124–128. [Google Scholar]
- Ullman, J.D. Principles of database and knowledge-base systems; Computer Science Press, 1989. [Google Scholar]
- Axelsson, S. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security 2000, 3, 186–205. [Google Scholar] [CrossRef]
- Oppliger, R. Internet security: Firewalls and beyond. Communications of the ACM 1997, 40, 92–102. [Google Scholar] [CrossRef]
- Bellovin, S.M. Security problems in the TCP/IP protocol suite. ACM SIGCOMM Computer Communication Review 1989, 19, 32–48. [Google Scholar] [CrossRef]
- Kim, Y.; McClendon, R.L.; Kim, H.Y. Fault detection for cyber-physical systems using machine learning: A survey. Computers & Electrical Engineering 2020, 87. [Google Scholar]
- Joseph, A.D.; Taft, J.A. In-depth defense for intrusion detection. IEEE Internet Computing 2002, 6, 58–61. [Google Scholar]
- Grobauer, B.; Walloschek, T.; Stocker, E. Understanding cloud computing vulnerabilities. IEEE Security & Privacy 2011, 9, 50–57. [Google Scholar]
- Modi, C.; Patel, D.; Borisaniya, B.; Patel, A.; Rajarajan, M. A survey of intrusion detection techniques in cloud. Journal of Network and Computer Applications 2013, 36, 42–57. [Google Scholar] [CrossRef]
- Mahoney, M.V.; Chan, P.K. An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection. in Proc. of RAID; 2003. [Google Scholar]
- Debar, H.; Becker, M.; Siboni, D. A neural network component for an intrusion detection system. in Proc. of the IEEE Symposium on Research in Security and Privacy; 1992. [Google Scholar]
- Chandola, V.; Banerjee, A.; Kumar, V. Anomaly detection: A survey. ACM Computing Surveys 2009, 41, 1–58. [Google Scholar] [CrossRef]
- Nicol, D.M.; Sanders, W.H.; Trivedi, K.S. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing 2004, 1, 48–65. [Google Scholar] [CrossRef]
- Lippmann, R.P.; Fried, D.J.; Kendall, K.R. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. in Proc. of DARPA Information Survivability Conference and Exposition; 2000. [Google Scholar]
- Northcutt, S.; Novak, J. Network Intrusion Detection: An Analyst’s Handbook, 3rd ed.New Riders Publishing, 2002. [Google Scholar]
- Patcha, A.; Park, J.M. An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks 2007, 51, 3448–3470. [Google Scholar] [CrossRef]
- Zhang, Y.; Lee, W.; Huang, Y. Intrusion detection techniques for mobile wireless networks. Wireless Networks 2003, 9, 545–556. [Google Scholar] [CrossRef]
- Nguyen, T.T.; Armitage, G. A survey of techniques for Internet traffic classification using machine learning. IEEE Communications Surveys & Tutorials 2008, 10, 56–76. [Google Scholar] [CrossRef]
- Dainotti, A.; Pescape, A.; Claffy, K. Issues and future directions in traffic classification. IEEE Network 2012, 26, 35–40. [Google Scholar] [CrossRef]
- Shin, S.; Gu, G. CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks. in Proc. of IEEE CNSM; 2012. [Google Scholar]
- Holz, T.; Engelberth, M.; Freiling, F. Learning more about the underground economy: A case-study of keyloggers and dropzones. in Proc. of the European Symposium on Research in Computer Security (ESORICS); 2009. [Google Scholar]
- Nazario, J. Phishing activity trends report; Anti-Phishing Working Group, 2015. [Google Scholar]
- Anderson, R.; Moore, T. Information security economics–and beyond. in Proc. of Information Security Summit; 2009. [Google Scholar]
- Sommer, R.; Paxson, V. Outside the closed world: On using machine learning for network intrusion detection. in Proc. of IEEE Symposium on Security and Privacy, 2010. C. Kruegel and G. Vigna, “Anomaly detection of web-based attacks,” in Proc. of the ACM Conf. on Computer and Communications Security (CCS), 2003. [Google Scholar]
- Bilge, L.; Dumitras, T. Before we knew it: An empirical study of zero-day attacks in the real world. in Proc. of ACM CCS; 2012. [Google Scholar]
- Scarfone, K.; Mell, P. Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Special Publication 800-94, 2007.
- Provos, N.; Holz, T. , Virtual Honeypots: From Botnet Tracking to Intrusion Detection; Addison-Wesley, 2007. [Google Scholar]
- Schneier, B. Secrets and Lies: Digital Security in a Networked World; Wiley, 2004. [Google Scholar]
- Debar, H.; Dacier, M.; Wespi, A. Towards a taxonomy of intrusion-detection systems. Computer Networks 1999, 31, 805–822. [Google Scholar] [CrossRef]
- Stallings, W. Network Security Essentials: Applications and Standards; Pearson, 2014. [Google Scholar]
- Ye, N.; Vilbert, S.; Chen, Q. Computer intrusion detection through EWMA for autocorrelated and uncorrelated data. IEEE Transactions on Reliability 2003, 52, 75–82. [Google Scholar]
- Roesch, M. Snort – Lightweight Intrusion Detection for Networks. in Proc. of the 13th USENIX Conference on System Administration; 1999. [Google Scholar]
- S. Bratus, “What hackers learn that the rest of us don’t: Notes on hacker curriculum,” IEEE Security & Privacy, vol. 5, no. 4, pp. 72–75, 2007.”Outside the closed world: On using machine learning for network intrusion detection,” in Proc. of IEEE Symposium on Security and Privacy, 2010.”Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation,” in Proc. of DARPA Information Survivability Conference and Exposition, 2000.”Internet security: Firewalls and beyond,” Communications of the ACM, vol. 40, no. 5, pp. 92–102, 1997.”Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead,” IEEE Communications Surveys & Tutorials, vol. 14, no. 2, pp. 355–379, 2012.”Honeywords: Making password-cracking detectable,” in Proc. of the ACM Conf. on Computer and Communications Security (CCS), 2013.”Industrial control systems security: What is happening?” in Industrial Control Systems Security, Springer, 2015.
- Lopez, J.; Tapiador, J.E. Privacy and security in multi-agent systems: Trends and challenges. Computers & Security 2013, 36, 95–105. [Google Scholar]
- Wueest, C.; Makrushin, I. Securing the Smart Home: Threats and Countermeasures. Symantec Whitepaper, 2019.
- Ferrag, M.A.; Maglaras, L.; Janicke, H. Authentication and authorization for the Internet of Things: A survey. Security and Privacy 2018, 1, e20. [Google Scholar]
- Chandola, R.; Banerjee, A.; Kumar, V. Anomaly detection for temporal data: A survey. IEEE Trans. on Knowledge and Data Engineering 2012, 24, 453–474. [Google Scholar] [CrossRef]
- Ruj, S.; Stojmenovic, M.; Nayak, A. Decentralized access control schemes for data storage in clouds. IEEE Trans. on Parallel and Distributed Systems 2014, 25, 384–394. [Google Scholar] [CrossRef]
- Gollmann, D. Securing critical infrastructures. in Proc. of the IEEE Int. Conference on Emerging Security Information, Systems and Technologies; 2010; pp. 37–42. [Google Scholar]
- Modi, C.; Patel, D.; Patel, A. Intrusion detection in cloud computing: Techniques and future directions. Computer Communications 2014, 50, 1–15. [Google Scholar]
- Salah, K.; Albreiki, M.H.; Al-Qutayri, A. Blockchain for AI: Review and open challenges. Future Generation Computer Systems 2022, 131, 95–111. [Google Scholar]
- Coskun, B.; Dietrich, S.; Memon, N. Friends of Anomaly: Unsupervised anomaly detection via friend-based modeling. in Proc. of ACM Workshop on Artificial Intelligence and Security (AISec); 2011. [Google Scholar]
- Rios, E.; Wang, X. Real-time big data analytics for cybersecurity. IEEE Intelligent Systems 2017, 32, 86–90. [Google Scholar]
- Holz, T.; Raynal, F.; Dornseif, M. Detecting honeypots and other suspicious environments. in Proc. of the IEEE Workshop on Information Assurance; 2005. [Google Scholar]
- Giani, A.; Tabatabaei, V.E.M.; Campbell, R.H. Collecting and analyzing SCADA data for security monitoring. in Proc. of the 3rd Int. Conf. on Critical Infrastructure Protection; 2009. [Google Scholar]
- Wang, L.; Atkinson, G. An effective framework for detecting insider threats using deep learning. Computers & Security 2021, 102, 102–123. [Google Scholar]
- Wang, H.J.; Guo, C.; Simon, D.; Zugenmaier, A. Shielding applications from an untrusted cloud with Haven. ACM Trans. on Computer Systems 2015, 33, 1–26. [Google Scholar] [CrossRef]
- Mathew, S.; Mishra, A.; Chaudhari, N.S. Zero Trust in critical infrastructure: A cyber-physical systems approach. in Proc. of IEEE Conf. on Smart Grid Communications; 2022. [Google Scholar]
- Jaatun, M.G.; Nyre, A.A.; Tøndel, F.B. Security SLAs for cloud computing: A lifecycle approach. in Proc. of IEEE Int. Conf. on Cloud Computing; 2012. [Google Scholar]
- Chandramouli, R.; Souppaya, M. Developing cyber-resilient systems: Principles and practices. NIST Cybersecurity White Paper, 2020.
- Baig, Z.A. Cyber-physical systems: Architecture, security, and application. Future Internet 2020, 12, 1–20. [Google Scholar]
- Tran, T.T.; Cummings, J.R.; Ramakrishnan, K.K. Machine learning for network security: A review of current advances and challenges. ACM Computing Surveys 2023, 55, 1–35. [Google Scholar] [CrossRef]
- Kim, H.; Kim, J.; Park, J.H. Machine learning-based anomaly detection approach for industrial control systems. IEEE Access 2019, 7, 110264–110275. [Google Scholar]
- Creech, G.; Hu, J. A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns. IEEE Transactions on Computers 2014, 63, 807–819. [Google Scholar] [CrossRef]
- Osseiran, A.; et al. Scenarios for 5G mobile and wireless communications: the vision of the METIS project. IEEE Communications Magazine 2014, 52, 26–35. [Google Scholar] [CrossRef]
- Mitchell, R.; Chen, I.R. A survey of intrusion detection techniques for cyber-physical systems. ACM Computing Surveys 2014, 46, 1–29. [Google Scholar] [CrossRef]
- Conti, M.; Dehghantanha, A.; Franke, K.; Watson, S. Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems 2018, 78, 544–546. [Google Scholar] [CrossRef]
- Li, H.; Lai, L.; Zhang, W. Communication requirement for reliable and secure state estimation and control in smart grid. IEEE Transactions on Smart Grid 2011, 2, 476–486. [Google Scholar] [CrossRef]
- Tankard, C. Advanced persistent threats and how to monitor and deter them. Network Security 2011, 2011, 16–19. [Google Scholar] [CrossRef]
- Wang, Y.; Liu, W.; Chen, Y. A review of anomaly detection techniques in text streams. Expert Systems with Applications 2014, 41, 5200–5212. [Google Scholar]
- Kendall, K. A database of computer attacks for the evaluation of intrusion detection systems. Master’s thesis, MIT, 1999. [Google Scholar]
- Denning, D. An intrusion-detection model. IEEE Transactions on Software Engineering 1987, SE-13, 222–232. [Google Scholar] [CrossRef]
- Ullrich, J. DShield: Distributed intrusion detection system. [Online]. Available: https://www.dshield.org.
- Schneier, B. Applied Cryptography, 2nd ed.; Wiley, 1996. [Google Scholar]
- Inoue, H.; et al. Anomaly detection for a secure grid computing environment. in Proc. of the IEEE/IPSJ Int. Symposium on Applications and the Internet; 2007. [Google Scholar]
- Yang, Y.; McLaughlin, K.; Sezer, S. Multiattribute SCADA-specific intrusion detection system for power networks. IEEE Transactions on Industrial Informatics 2013, 9, 822–832. [Google Scholar] [CrossRef]
- Bhattacharyya, D.K.; Kalita, J.K. Network Anomaly Detection: A Machine Learning Perspective; CRC Press, 2013. [Google Scholar]
- Bridges, S.M.; Vaughn, R.B. Fuzzy data mining and genetic algorithms applied to intrusion detection. in Proc. of the National Information Systems Security Conference; 2000. [Google Scholar]
- Ning, P.; Cui, Y. An intrusion detection system based on runtime program behavior models. Journal of Computer Security 2002, 10, 1–30. [Google Scholar]
- Spitzner, L. Honeypots: Catching the insider threat. in Proc. of the Annual Computer Security Applications Conference; 2003. [Google Scholar]
- Bishop, M. Computer Security: Art and Science; Addison-Wesley, 2002. [Google Scholar]
- Mell, P.; Grance, T. The NIST definition of cloud computing. NIST Special Publication 800-145, 2011. [Google Scholar]
- Gens, F. IDC’s worldwide IT industry predictions. IDC Reports, 2012. [Google Scholar]
- Sandhu, R.S.; et al. Role-based access control models. IEEE Computer 1996, 29, 38–47. [Google Scholar] [CrossRef]
- Axelsson, S. Intrusion detection systems: A survey and taxonomy; Technical Report; Chalmers University, 2000. [Google Scholar]
- Lee, W.; Xiang, D. Information-theoretic measures for anomaly detection. in Proc. of the IEEE Symposium on Security and Privacy; 2001. [Google Scholar]
- Alicherry, M.; Keromytis, A.D. DoubleClick: Cluster-based distributed IP lookup. in Proc. of IEEE INFOCOM; 2004. [Google Scholar]
- Denning, D.E. Cryptography and data security; Addison-Wesley, 1982. [Google Scholar]
- Garfinkel, S.; Spafford, G. Practical UNIX and Internet Security; O’Reilly Media, 2003. [Google Scholar]
- Viega, J.; McGraw, G. Building Secure Software; Addison-Wesley, 2001. [Google Scholar]
- Zhang, Y.; Deng, J.; Wah, B.W. Digital forensics for online social networks. Computer 2012, 45, 36–42. [Google Scholar]
- Zissis, D.; Lekkas, D. Addressing cloud computing security issues. Future Generation Computer Systems 2012, 28, 583–592. [Google Scholar] [CrossRef]
- Bertino, E.; Sandhu, R. Database security—concepts, approaches, and challenges. IEEE Transactions on Dependable and Secure Computing 2005, 2, 2–19. [Google Scholar] [CrossRef]
- Armbrust, M.; et al. A view of cloud computing. Communications of the ACM 2010, 53, 50–58. [Google Scholar] [CrossRef]
- Jensen, M.; Gruschka, N.; Herkenhöner, R. A survey of attacks on web services. Computer Science - Research and Development 2009, 24, 185–197. [Google Scholar] [CrossRef]
- Cachin, C.; Keidar, I.; Shraer, A. Trusting the cloud. ACM SIGACT News 2009, 40, 81–86. [Google Scholar] [CrossRef]
- Mitnick, K.D.; Simon, W.L. , The Art of Deception; Wiley, 2002. [Google Scholar]
- Cole, E. Hackers Beware; New Riders, 2002. [Google Scholar]
- Provos, N.; Honeyman, P. Preventing privilege escalation. in Proc. of USENIX Security Symposium; 2003. [Google Scholar]
- Clarke, R.; Knake, D. , Cyber War: The Next Threat to National Security and What to Do About It; Ecco, 2010. [Google Scholar]
- Velte, A.T.; Velte, T.J.; Elsenpeter, R. Cloud Computing: A Practical Approach; McGraw-Hill, 2009. [Google Scholar]
- Porras, P.; Neumann, P. EMERALD: Event monitoring enabling responses to anomalous live disturbances. in Proc. of the NIST/NCSC National Information Systems Security Conference; 1997. [Google Scholar]
- Al-Duwairi, A.Y.; Al-Hammouri, M. Flow-based detection of HTTP flood DDoS attacks using Hellinger distance. IEEE Transactions on Cybernetics 2015, 45, 178–191. [Google Scholar]
- Juels, A.; Rivest, R.L. Honeywords: Making password-cracking detectable. in Proc. of ACM CCS; 2013. [Google Scholar]
- Almorsy, M.; Grundy, J.; Ibrahim, A.S. Collusion-aware risk analysis model for cloud computing. Journal of Cloud Computing 2013, 2, 1–14. [Google Scholar]
- Sheth, A.; Larson, J.A. Federated database systems for managing distributed, heterogeneous, and autonomous databases. ACM Computing Surveys 1990, 22, 183–236. [Google Scholar] [CrossRef]
- Kagal, L.; Finin, T.; Joshi, A. A policy-based approach to security for the semantic web. International Semantic Web Conference; 2003. [Google Scholar]
- Clark, J.; van Oorschot, P.C. SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements. IEEE Symposium on Security and Privacy; 2013. [Google Scholar]
- Krebs, B. Spam Nation; Sourcebooks, 2014. [Google Scholar]
- Tankard, C. What the Snowden leaks mean for data security. Network Security 2014, 2014, 5–7. [Google Scholar]
- Anderson, R.J. Security Engineering, 2nd ed.Wiley, 2008. [Google Scholar]
- Howard, M.; LeBlanc, D. Writing Secure Code, 2nd ed.; Microsoft Press, 2002. [Google Scholar]
- Ghosh, A.; Schwartzbard, A. A study in using neural networks for anomaly and misuse detection. in Proc. of USENIX Security Symposium; 1999. [Google Scholar]
- Song, D.; Wagner, D.; Tian, X. Timing analysis of keystrokes and timing attacks on SSH. in Proc. of USENIX Security Symposium; 2001. [Google Scholar]
- Spafford, E. The Internet worm incident. ACM SIGCOMM Computer Communication Review 1989, 19, 24–33. [Google Scholar]
- Rogers, M.K. A Social Learning Theory and Moral Disengagement Analysis of Criminal Computer Behavior: An Exploratory Study. PhD Dissertation, 2001. [Google Scholar]
- Gutmann, P. Secure deletion of data from magnetic and solid-state memory. in Proc. of USENIX Security Symposium; 1996. [Google Scholar]
- Meadows, C. Formal methods for cryptographic protocol analysis: Emerging issues and trends. IEEE Journal on Selected Areas in Communications 2003, 21, 44–54. [Google Scholar] [CrossRef]
- Perrig, A.; Szewczyk, R.; Wen, V.; Culler, D.; Tygar, J.D. SPINS: Security protocols for sensor networks. Wireless Networks 2002, 8, 521–534. [Google Scholar] [CrossRef]
- Wang, H.; Zhang, D.; Shin, K.G. Change-point monitoring for the detection of DoS attacks. IEEE Transactions on Dependable and Secure Computing 2004, 1, 193–208. [Google Scholar] [CrossRef]
- Filiol, E. Computer viruses: From theory to applications; Springer, 2005. [Google Scholar]
- Sipser, M. Introduction to the Theory of Computation; Cengage, 2012. [Google Scholar]
- Nielsen, J. Usability Engineering; Morgan Kaufmann, 1993. [Google Scholar]
- Vigna, G.; Kemmerer, R.A. NetSTAT: A network-based intrusion detection system. Journal of Computer Security 1999, 7, 37–71. [Google Scholar] [CrossRef]
- Lippmann, R.P.; et al. The 1999 DARPA off-line intrusion detection evaluation. Computer Networks 2000, 34, 579–595. [Google Scholar] [CrossRef]
- Bowen, B.M.; Hershkop, S.; Keromytis, A.D.; Stolfo, S.J. Baiting inside attackers using decoy documents. in Proc. of SecureComm; 2009. [Google Scholar]
- Shirey, R. Internet Security Glossary. RFC 2828. 2000.
- Dierks, T.; Allen, C. The TLS protocol version 1.0. RFC 2246. 1999.
- Boneh, D.; Franklin, M. Identity-based encryption from the Weil pairing. SIAM Journal on Computing 2003, 32, 586–615. [Google Scholar] [CrossRef]
- Lemos, R. Cybersecurity’s weakest link: Humans. IEEE Spectrum 2005, 42, 15–17. [Google Scholar]
- Ristenpart, T.; et al. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. in Proc. of ACM CCS; 2009. [Google Scholar]
- Hurlburt, G. Moving toward Symmetry in Cybersecurity. IT Professional 2018, 20, 72–75. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).