Research on Distributed Intrusion Detection Model Based on Information Fusion

被引:0
|
作者
Ping, Du [1 ]
Wei, Xu [1 ]
机构
[1] E China Inst Technol, Key Lab Radioact Geol & Explorat Technol Fundamen, Fuzhou City 344000, Jiangxi, Peoples R China
来源
关键词
intrusion detection; distribution; information fusion; network security;
D O I
10.4028/www.scientific.net/AMR.121-122.528
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The research actuality of Intrusion Detection System(IDS) were analyzed, Due to the defects of IDS such as high positive rate of IDS and incapable of effective detection of dispersed coordinated attacks on the time and space, the ideas of the multi-source information fusion were introduced in the paper, a multi-level IDS reasoning framework and prototype system were presented. The prototype adds analysis engine to the existing IDS Sensor, We used Bayesian Network as a tool for multi-source information fusion, and we used goal-tree to analyze the attempts of coordinated attacks and quantify the security risk of system. Compared to the existing IDS, the prototype is more integrated and more capable in finding coordinated attacks with lower false positive rate.
引用
下载
收藏
页码:528 / 533
页数:6
相关论文
共 50 条
  • [21] MODEL OF DISTRIBUTED INTRUSION DETECTION SYSTEM
    Trifonov, Vencisalv
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2010, 2 (02): : 67 - 72
  • [22] A Distributed Intrusion Detection System Model
    Wu, Shaofei
    Xiao, Shuchao
    PROCEEDINGS OF 2008 INTERNATIONAL PRE-OLYMPIC CONGRESS ON COMPUTER SCIENCE, VOL I: COMPUTER SCIENCE AND ENGINEERING, 2008, : 331 - 334
  • [23] Research on Intrusion Detection System Based on Host Information Recognition
    Sui, Xin
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, INFORMATION AND MECHANICAL ENGINEERING (EMIM 2017), 2017, 76 : 481 - 483
  • [24] The Research of Intrusion Detection Algorithms Based on the Clustering of Information Entropy
    Ye Zheng-wang
    2011 INTERNATIONAL CONFERENCE OF ENVIRONMENTAL SCIENCE AND ENGINEERING, VOL 12, PT B, 2012, 12 : 1329 - 1334
  • [25] Research on sharing of intrusion detection information
    Xiong, JJ
    Zhang, R
    Zhu, GM
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 549 - 552
  • [26] Research on fuzzy sets based intrusion detection model
    Wan, Liyong
    Yang, Chao
    ADVANCING SCIENCE THROUGH COMPUTATION, 2008, : 266 - 269
  • [27] Research on the Application of Distributed Intrusion Detection System Based on Election Algorithm
    Wang, Wuqi
    Yang, Zhi-min
    Peng, Gong
    HUMAN CENTERED COMPUTING, HCC 2014, 2015, 8944 : 670 - 676
  • [28] Research on distributed network intrusion detection system for IoT based on honeyfarm
    Wu H.
    Hao J.
    Lu Y.
    Tongxin Xuebao/Journal on Communications, 2024, 45 (01): : 106 - 118
  • [29] Research of Distributed Network Intrusion Detection System Based on Rough Set
    Zhong Zufeng
    PROCEEDINGS OF 2009 CONFERENCE ON COMMUNICATION FACULTY, 2009, : 200 - 202
  • [30] Research of Intrusion Detection based on Ensemble Learning Model
    Li Yang
    Li Jianlin
    Yue Songjie
    Wang Zhi
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 2376 - 2380