A novel approach of alarm classification for intrusion detection based upon Dempster-Shafer theory

被引:0
|
作者
Feng, Guangsheng [1 ]
Wang, Huiqiang [1 ]
Zhao, Qian [1 ]
机构
[1] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin, Heilongjiang, Peoples R China
关键词
intrusion detection systems; Dempster-Shafer theory; data fusion; classification;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As the number of the alarms is increasingly growing, which are generated by intrusion detection systems (IDS), automatic tools for classification have been proposed to fulfil the requirements of the huge volume of alarms. In addition, it has been shown that an accurate classification requires the evidences from different sources, such as different IDS. Further more, Dempster-Shafer theory is a powerful tool in dealing with the uncertainty information. This paper proposes multiple-level classification model, which aims to classify the large sizes of alarms exactly. Experimental results show that this approach has an outstanding capability of classification. Especially it is quite effective in avoiding alarms grouped into the wrong classes in the case of short of evidences.
引用
收藏
页码:234 / +
页数:2
相关论文
共 50 条
  • [21] Dempster-Shafer theory in gross error detection
    Zhou, Ling-Ke
    Liu, Rui-Lan
    [J]. Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2005, 29 (SUPPL.): : 164 - 166
  • [22] The application of Dempster-Shafer theory for landmine detection
    Mudigonda, NR
    Kacelenga, R
    Erickson, D
    [J]. MULTISENSOR, MULTISOURCE INFORMATION FUSION: ARCHITECTURES, ALGORITHMS, AND APPLICATIONS 2003, 2003, 5099 : 103 - 112
  • [23] A Novel Combination Methodology for Dempster-Shafer Theory
    Turhan, Hasan Ihsan
    Demirekler, Mubeccel
    [J]. 2017 25TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2017,
  • [24] Implementation of Fuzzy C-Means and Dempster-Shafer Theory for Anomaly Intrusion Detection
    Srinivasu, P.
    Avadhani, P. S.
    Pradeep, Tummala
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (09): : 39 - 46
  • [25] Multisource classification using ICM and Dempster-Shafer theory
    Foucher, S
    Germain, M
    Boucher, JM
    Bénié, GB
    [J]. IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2002, 51 (02) : 277 - 281
  • [26] A Dempster-Shafer based approach to the detection of trajectory stop points
    Milaghardan, Amin Hosseinpoor
    Abbaspour, Rahim Ali
    Claramunt, Christophe
    [J]. COMPUTERS ENVIRONMENT AND URBAN SYSTEMS, 2018, 70 : 189 - 196
  • [27] Collaborative Intrusion Detection in a Federated Cloud Environment Using the Dempster-Shafer Theory of Evidence
    MacDermott, Aine
    Shi, Qi
    Kifayat, Kashif
    [J]. PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 195 - 203
  • [28] Reliability-Based Imbalanced Data Classification with Dempster-Shafer Theory
    Tian, Hongpeng
    Zhang, Zuowei
    Martin, Arnaud
    Liu, Zhunga
    [J]. BELIEF FUNCTIONS: THEORY AND APPLICATIONS (BELIEF 2022), 2022, 13506 : 77 - 86
  • [29] MEASURING TOTAL UNCERTAINTY IN DEMPSTER-SHAFER THEORY - A NOVEL-APPROACH
    HARMANEC, D
    KLIR, GJ
    [J]. INTERNATIONAL JOURNAL OF GENERAL SYSTEMS, 1994, 22 (04) : 405 - 419
  • [30] Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory
    Cheang, Chak Fong
    Wang, Yiqin
    Cai, Zhiping
    Xu, Gen
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 57 (02): : 297 - 306