A knowledge fusion based intrusion detection model

被引:0
|
作者
Gou Jin [1 ]
Yang Jiangang [1 ]
Chen Qian [1 ]
机构
[1] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310027, Peoples R China
关键词
knowledge fusion; intrusion detection;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper presents a compound intrusion detection model based on a knowledge fusion algorithm. The proposed method suggests a set of related pattern knowledge objects with a well-defined structure, which instructs that pattern knowledge can be used for misuse detection or anomaly detection or both of them. Fusion algorithm is used to fuse original or real time knowledge objects to generate new useful ones and destroy those who may lead to miscar-riage of justice. In contrast with the conventional intrusion detection models, process in the paper combines anomaly and misuse detection so that it eliminates the flaws of a narrow definition for intrusion patterns and extends the known intrusions patterns to novel intrusions patterns. The experimental results show the feasibility of design rationale.
引用
收藏
页码:1639 / 1642
页数:4
相关论文
共 50 条
  • [21] Security of distributed intrusion detection system based on multisensor fusion
    Vokorokos, Liberios
    Chovanec, Martin
    Latka, Ondrej
    Kleinova, Alzbeta
    2008 6TH INTERNATIONAL SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS, 2008, : 18 - 23
  • [22] Alert fusion for a computer host based intrusion detection system
    Feng, Chuan
    Peng, Jianfeng
    Qiao, Haiyan
    Rozenblit, Jerzy W.
    ECBS 2007: 14TH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS: RAISING EXPECTATIONS OF COMPUTER-BASES SYSTEMS, 2007, : 433 - +
  • [23] Stacknet Based Decision Fusion Classifier for Network Intrusion Detection
    Nti, Isaac Kofi
    Narko-Boateng, Owusu
    Adekoya, Adebayo Felix
    Somanathan, Arjun Remadevi
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2022, 19 (3A) : 478 - 490
  • [24] An immune based model for dynamic intrusion detection
    Liu, Xiaojie
    PRZEGLAD ELEKTROTECHNICZNY, 2012, 88 (3B): : 100 - 104
  • [25] Intrusion Detection Model Based on Improved Transformer
    Liu, Yi
    Wu, Lanjian
    APPLIED SCIENCES-BASEL, 2023, 13 (10):
  • [26] An immune based dynamic intrusion detection model
    LI Tao Department of Computer Science
    Science Bulletin, 2005, (22) : 2650 - 2657
  • [27] A network state based intrusion detection model
    Shan, Z
    Chen, P
    Xu, Y
    Xu, K
    2001 INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND MOBILE COMPUTING, PROCEEDINGS, 2001, : 481 - 486
  • [28] A data mining based intrusion detection model
    Sun, JH
    Jin, H
    Chen, H
    Han, ZF
    Zou, DQ
    INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING, 2003, 2690 : 677 - 684
  • [29] An efficient intrusion detection model based on deepFM
    Ji, Yuchen
    Li, Xiaoyong
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 778 - 783
  • [30] Intrusion detection based on Hidden Markov Model
    Yin, QB
    Shen, LR
    Zhang, RB
    Li, XY
    Wang, HQ
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 3115 - 3118