A knowledge fusion based intrusion detection model

被引:0
|
作者
Gou Jin [1 ]
Yang Jiangang [1 ]
Chen Qian [1 ]
机构
[1] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310027, Peoples R China
关键词
knowledge fusion; intrusion detection;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper presents a compound intrusion detection model based on a knowledge fusion algorithm. The proposed method suggests a set of related pattern knowledge objects with a well-defined structure, which instructs that pattern knowledge can be used for misuse detection or anomaly detection or both of them. Fusion algorithm is used to fuse original or real time knowledge objects to generate new useful ones and destroy those who may lead to miscar-riage of justice. In contrast with the conventional intrusion detection models, process in the paper combines anomaly and misuse detection so that it eliminates the flaws of a narrow definition for intrusion patterns and extends the known intrusions patterns to novel intrusions patterns. The experimental results show the feasibility of design rationale.
引用
收藏
页码:1639 / 1642
页数:4
相关论文
共 50 条
  • [31] Cooperative intrusion detection model based on scenario
    Teng, Shaohua
    Zhang, Wei
    Fu, Xiufen
    Tan, Wenwei
    PROCEEDINGS OF THE 2007 11TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS 1 AND 2, 2007, : 876 - +
  • [32] Intrusion Detection Based on the Short Sequence Model
    Mao, Guojun
    Zhang, Jing
    Wu, Xindong
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 1449 - +
  • [33] An Rough Sets Based Intrusion Detection Model
    Wang Xiaodong
    Lin Jianhui
    ICAIE 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND EDUCATION, VOLS 1 AND 2, 2009, : 758 - 761
  • [34] Hidden Markov model based intrusion detection
    Liu, Zhi-Yong
    Qiao, Hong
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3917 : 169 - 170
  • [35] An immune based dynamic intrusion detection model
    Li, T
    CHINESE SCIENCE BULLETIN, 2005, 50 (22): : 2650 - 2657
  • [36] Active Intrusion Detection model based on Magician
    Yang, Xu
    Tian, Zhizhong
    Yang, Yongjian
    ADVANCING SCIENCE THROUGH COMPUTATION, 2008, : 180 - 182
  • [37] Group-Based Federated Knowledge Distillation Intrusion Detection
    Gao, Tiaokang
    Jin, Xiaoning
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2024, 34 (08) : 1251 - 1279
  • [38] An Efficient and Lightweight Approach for Intrusion Detection based on Knowledge Distillation
    Zhao, Ruijie
    Chen, Yu
    Wang, Yijun
    Shi, Yong
    Xue, Zhi
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [39] Prior knowledge SVM-based intrusion detection framework
    Zhang, Gang
    Yin, Jian
    Liang, Zhaohui
    Cai, YanGuang
    ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 2, PROCEEDINGS, 2007, : 489 - +
  • [40] Improved RBF Network Intrusion Detection Model Based on Edge Computing with Multi-algorithm Fusion
    Liu, Xuejun
    Li, Kaili
    Wang, Wenhui
    Yan, Yong
    Sha, Yun
    Chen, Jianping
    Qin, Jiaojiao
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2021, 16 (04) : 1 - 16