miguel pupo correia           
 

Security Analytics and Intrusion Detection

The amount of existing data is growing so large that this become a research area (“big data”) and an opportunity also in terms of cybersecurity. I have been doing research on these topics along three lines: analytics techniques, platforms for large-scale data processing, and intrusion detection.

Funded projects: SPARTA

Current team: Luís Dias, Arnaldo Gouveia, João Amado, Tiago Fernandes, Gilberto Gomes, Diogo Vilela

Software prototypes: DynIDS, OutGene, Chrysaor, Medusa, BFT Hadoop

Selected publications:

Pedro Marques, Luis Filipe Dias and Miguel Correia. CyberVTI: Cyber Visualization Tool for Intrusion Detection. In 20th IEEE International Symposium on Network Computing and Applications, Nov. 2021

Tiago Fernandes, Luis Dias and Miguel Correia. C2BID: Cluster Change-Based Intrusion Detection. In Proceedings of Trustcom 2020, December 2020 (pdf).

Luis Dias, Simão Valente and Miguel Correia. Go With the Flow: Clustering Dynamically-Defined NetFlow Features for Network Intrusion Detection with DYNIDS. In Proceedings of the 19th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2020 (pdf, software).

Arnaldo Gouveia and Miguel Correia. Towards Quantum-Enhanced Machine Learning for Network Intrusion Detection. In Proceedings of the 19th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2020 (pdf).

Pedro Costa, Fernando Ramos, and Miguel Correia. On the Design of Resilient Multicloud MapReduce. IEEE Cloud Computing, vol. 4(4) pp. 74-82, July/August 2017. (pdf)

Pedro A. R. S. Costa, Fernando M. V. Ramos, Miguel Correia. Chrysaor: Fine-Grained, Fault-Tolerant Cloud-of-Clouds MapReduce. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2017. (pdf, software) Best Student Paper Award

P. Costa, M. Pasin, A. Bessani, M. Correia. On the Performance of Byzantine Fault-Tolerant MapReduce. IEEE Transactions on Dependable and Secure Computing, vol. 10. no. 5, pp. 301-313, Set.-Oct. 2013 (pdf, software)

Other publications:

Gilberto Gomes, Luis Dias and Miguel Correia. CryingJackpot: Network Flows and Performance Counters against Cryptojacking. In Proceedings of the 19th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2020 (pdf).

Fábio Gomes and Miguel Correia. Cryptojacking Detection with CPU Usage Metrics. In Proceedings of the 19th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2020 (pdf).

Arnaldo Gouveia and Miguel Correia. XGBoost(ing) Network Intrusion Detection. In Advances in Security, Privacy and Trust for Internet-of-Things (IoT) and Cyber-Physical Systems (CPS), CRC Press, 2020. (pdf)

Arnaldo Gouveia and Miguel Correia. Deep Learning for Network Intrusion Detection: An Empirical Assessment. In Advances in Security, Privacy and Trust for Internet-of-Things (IoT) and Cyber-Physical Systems (CPS), CRC Press, 2020. (pdf)

Gil Mouta, Miguel L. Pardal, João Bota, Miguel Correia. SPATIO: end-uSer Protection Against ioT IntrusiOns. In Advances in Security, Privacy and Trust for Internet-of-Things (IoT) and Cyber-Physical Systems (CPS), CRC Press, 2020. (pdf)

Luís Sacramento, Ibéria Medeiros, João Bota, Miguel Correia. Detecting Botnets and Unknown Network Attacks in Big Traffic Data. In Botnets: Architectures, Countermeasures, and Challenges, Chapter 7, CRC Press, 2020. (pdf)

Luís Filipe Dias and Miguel Correia. Big Data Analytics for Intrusion Detection: An Overview. In Handbook of Research on Machine and Deep Learning Applications for Cyber Security, ed. Padmavathi Ganapathi and D. Shanmugapriya, IGI Global, 2020. (pdf)

Luís Dias, Hélder Reia, Rui Neves, and Miguel Correia. OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zoom. In Proceedings of the 13th International Conference on Network and System Security, Sapporo, Japan, Dec. 2019. (pdf, software)

Luís Sacramento, Ibéria Medeiros, João Bota, and Miguel Correia. FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data using Network Flows. In Proceedings of IEEE TrustCom, July 2018. (pdf)

Arnaldo Gouveia, Miguel Correia. A Systematic Approach for the Application of Restricted Boltzmann Machines in Network Intrusion Detection. In Proceedings of the International Work-Conference on Artificial Neural Networks (IWANN), Jun. 2017. (pdf)

Diogo Frazão, João Redol, and Miguel Correia. PARADISE: Modular Click Fraud Detection. In 2017 European Security Conference: Cybersecurity Analytics, Jun. 2017.

Arnaldo Gouveia, Miguel Correia. Feature Set Tuning for Machine Learning based Network Intrusion Detection. In Proceedings of the 15th IEEE International Symposium on Network Computing and Applications (NCA), Nov. 2016. (pdf)

Pedro A. R. S. Costa, Xiao Bai, Fernando M. V. Ramos, Miguel Correia. Medusa: An Efficient Cloud Fault-Tolerant MapReduce. In Proceedings of the 16th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2016. (pdf, software)

Daniel Gonçalves, João Bota, Miguel Correia. Big Data Analytics for Detecting Host Misbehavior in Large Logs. In Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Aug. 2015.(pdf)

Daniel Presser, Lau Cheuk Lung, Miguel Correia. Greft: Arbitrary Fault-Tolerant Distributed Graph Processing. In Proceedings of the IEEE BigData Congress 2015, Jun.-Jul. 2015. (pdf)

Pedro Costa, Marcelo Pasin, Alysson N. Bessani and Miguel Correia. Byzantine Fault-Tolerant MapReduce: Faults Are Not Just Crashes. In Proceedings of the 3rd IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Nov-Dec. 2011. (pdf, software) Best Paper Award

G. Nascimento, M. Correia. Anomaly-based Intrusion Detection in Software as a Service. In Proceedings of the 5th Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS, with DSN'11), Hong Kong, June 2011. (pdf)

Pan Jieke, João Redol, Miguel Correia. Specification-Based Intrusion Detection System for Carrier Ethernet. In International Conference on Web Information Systems and Technologies (WEBIST 2007), Barcelona, Spain, March 2007 (pdf)

copyright notice

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders: IEEE, ACM, Springer-Verlag, Elsevier, Oxford University Press. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.


home | last update: 02-10-2018