PHM-Based Modeling for Cyberattack Classifier Performance
##plugins.themes.bootstrap3.article.main##
##plugins.themes.bootstrap3.article.sidebar##
Abstract
This research implements Prognostics and Health Management (PHM) using multiple linear regression and multivariate time series models to monitor and predict when the performance of a Machine Learning-based cyberattack classifier might degrade to an unacceptable level, enabling preemptive maintenance strategies.
How to Cite
##plugins.themes.bootstrap3.article.details##
Prognostics and Health Management, Machine Learning Algorithms, Cyberattack Classifier, Multiple Linear Regression, Multivariate Time Series
Baye, G., Silva, P., Broggi, A., Fiondella, L., Bastian, N. D., & Kul, G. (2023). Performance analysis of deeplearning based open set recognition algorithms for network intrusion detection systems. In Noms 2023-2023 ieee/ifip network operations and management symposium (p. 1-6).
Brandt, P., &Williams, J. (2007). Multiple time series models (No. no. 148). SAGE Publications.
Javaid, A., Niyaz, Q., Sun, W., & Alam, M. (2016). A deep learning approach for network intrusion detection system. In Proceedings of the 9th eai international conference on bio-inspired information and communications technologies (formerly bionetics) (pp. 21–26).
Kleinbaum, D. G., Kupper, L. L., Nizam, A., & Rosenberg, E. S. (1999). Applied regression analysis and other multivariable methods. Cengage Learning.
Lewis, J. A. (2002). Assessing the risks of cyber terrorism, cyber war and other cyber threats. Center for Strategic & International Studies Washington, DC.
Liao, H.-J., Richard Lin, C.-H., Lin, Y.-C., & Tung, K.-Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 36(1), 16-24.
Lo, W. W., Layeghy, S., Sarhan, M., Gallagher, M., & Portmann, M. (2022). E-graphsage: A graph neural network based intrusion detection system for iot. In Noms 2022-2022 ieee/ifip network operations and management symposium (p. 1-9).
Narayana Rao, K., Venkata Rao, K.,&P.V.G.D., P. R. (2021). A hybrid intrusion detection system based on sparse autoencoder and deep neural network. Computer Communications, 180, 77-88.
Pham, H. (1999). Software reliability. John Wiley & Sons.
Rosay, A., Cheval, E., Carlier, F., & Leroux, P. (2022). Network intrusion detection: A comprehensive analysis of cic-ids2017. In 8th international conference on information systems security and privacy (pp. 25–36).
Sharma, J., Giri, C., Granmo, O.-C., & et al. (2019). Multilayer intrusion detection system with extratrees feature selection, extreme learning machine ensemble, and softmax aggregation. EURASIP Journal on Information Security, 2019(15). doi: 10.1186/s13635-019-0098-y
Wu, H., Sun, P., Liu, P., Li, Q., Liu, C., Lu, X., . . . Chen, J. (2020). Dl-ids: Extracting features using cnn-lstm hybrid network for intrusion detection system. Security and Communication Networks, 2020, 8890306.
This work is licensed under a Creative Commons Attribution 3.0 Unported License.
The Prognostic and Health Management Society advocates open-access to scientific data and uses a Creative Commons license for publishing and distributing any papers. A Creative Commons license does not relinquish the author’s copyright; rather it allows them to share some of their rights with any member of the public under certain conditions whilst enjoying full legal protection. By submitting an article to the International Conference of the Prognostics and Health Management Society, the authors agree to be bound by the associated terms and conditions including the following:
As the author, you retain the copyright to your Work. By submitting your Work, you are granting anybody the right to copy, distribute and transmit your Work and to adapt your Work with proper attribution under the terms of the Creative Commons Attribution 3.0 United States license. You assign rights to the Prognostics and Health Management Society to publish and disseminate your Work through electronic and print media if it is accepted for publication. A license note citing the Creative Commons Attribution 3.0 United States License as shown below needs to be placed in the footnote on the first page of the article.
First Author et al. This is an open-access article distributed under the terms of the Creative Commons Attribution 3.0 United States License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.