Application Ontology for the Development of Case-based Intrusion Detection Systems

被引:0
|
作者
Meneses, Rayane [1 ]
Leite, Adriana [1 ]
Girardi, Rosario [1 ]
机构
[1] Univ Fed Maranhao, Dept Ciencia Comp DEINF GESEC, Sao Luis, Brazil
关键词
Ontologies; Information Security; Intrusion Detection Systems; Network Attacks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work proposes an application ontology who is capable of formally represent the concepts present in the domain of Information Security together with the intrusion detection systems and case-based reasoning. The ontology was evaluated through the development of an IDS capable of detect computers networks attacks and recommend actions to such attacks. The results showed that the developed IDS presented good effectiveness in the detecting attacks, and so it is concluded that the proposed ontology conceptualizes properly the domain concepts and task.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] Design and Realization of Case-Based Ontology Reasoning
    Li Guan-yu
    Li Guan-yu
    Qu Li-ning
    Lv Shi-peng
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 11546 - +
  • [22] Industrial application development using case-based reasoning
    Sveda, Miroslav
    Rysavy, Ondrej
    ARTIFICIAL NEURAL NETWORKS AND INTELLIGENT INFORMATION PROCESSING, PROCEEDINGS, 2007, : 76 - 82
  • [23] Application and development of case-based reasoning in fixture design
    Wang, Qi
    Liao, Wenhe
    Journal of Southeast University (English Edition), 2004, 20 (02) : 170 - 175
  • [24] The integration of case-based systems and GIS in development control
    Shi, X
    Yeh, AGO
    ENVIRONMENT AND PLANNING B-PLANNING & DESIGN, 1999, 26 (03): : 345 - 364
  • [25] Development of hybrid case-based diagnostics for propulsion systems
    Bird, JW
    Hastings, RR
    2003 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOLS 1-8, 2003, : 3189 - 3196
  • [26] Case-based agents for packet-level intrusion detection in ad hoc networks
    Guha, R
    Kachirski, O
    Schwartz, DG
    Stoecklin, S
    Yilmaz, E
    PROCEEDINGS OF THE 17TH INTERNATIONAL SYMPOSIUM ON COMPUTER AND INFORMATION SCIENCES, 2003, : 315 - 320
  • [27] OSCIDS: An Ontology based SCADA Intrusion Detection Framework
    Al Balushi, Abdullah
    McLaughlin, Kieran
    Sezer, Sakir
    SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4, 2016, : 327 - 335
  • [28] Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems
    Cai, Chuanxi
    Mei, Shue
    Zhong, Weijun
    INFORMATION TECHNOLOGY & MANAGEMENT, 2019, 20 (02): : 55 - 71
  • [29] Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems
    Chuanxi Cai
    Shue Mei
    Weijun Zhong
    Information Technology and Management, 2019, 20 : 55 - 71
  • [30] Ontology-based Distributed Intrusion Detection System
    Abdoli, F.
    Kahani, M.
    2009 14TH INTERNATIONAL COMPUTER CONFERENCE, 2009, : 65 - +