Evidential reasoning in network intrusion detection systems

被引:0
|
作者
Esmaili, M [1 ]
Safavi-Naini, R [1 ]
Pieprzyk, J [1 ]
机构
[1] Univ Wollongong, Ctr Comp Secur Res, Wollongong, NSW 2522, Australia
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion Detection Systems (IDS) have previously been built by hand. These systems have difficulty successfully classifying intruders, and require a significant amount of computational overhead making it difficult to create robust real-time IDS systems. Artificial Intelligence techniques can reduce the human effort required to build these systems and can improve their performance. AI has recently been used in Intrusion Detection (ID) for anomaly detection, data reduction and induction, or discovery, of rules explaining audit data [1]. This paper proposes the application of evidential reasoning for dealing with uncertainty in Intrusion Detection Systems. We show how dealing with uncertainty can allow the system to detect the abnormality in the user behavior more efficiently.
引用
收藏
页码:253 / 265
页数:13
相关论文
共 50 条
  • [11] Evidential Reasoning in Air Battle Systems
    王欣
    管纪文
    于晓
    王钲旋
    JournalofDonghuaUniversity(EnglishEdition), 2007, (02) : 301 - 304
  • [12] A new unmanned aerial vehicle intrusion detection method based on belief rule base with evidential reasoning
    Xie, Yawen
    He, Wei
    Zhu, Hailong
    Yang, Ruohan
    Mu, Quanqi
    HELIYON, 2022, 8 (09)
  • [13] The Network Intrusion Detection Based on Reasoning and Guided Adaptive Convolutional Neural Network
    Wang, Tiezhu
    Qi, Lin
    Liu, Pengfei
    Gong, Zhiqiang
    Li, Liang
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2020, 126 : 234 - 234
  • [14] Robust Network Intrusion Detection Systems for Outlier Detection
    Desai, Rohan
    Venkatesh, T. G.
    2022 IEEE 27TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2022, : 140 - 146
  • [15] Adversarial examples for network intrusion detection systems
    Sheatsley, Ryan
    Papernot, Nicolas
    Weisman, Michael J.
    Verma, Gunjan
    McDaniel, Patrick
    JOURNAL OF COMPUTER SECURITY, 2022, 30 (05) : 727 - 752
  • [16] A benchmark evaluation of network intrusion detection systems
    Champion, T
    Denz, ML
    2001 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOLS 1-7, 2001, : 2705 - 2712
  • [17] Data fusion and network intrusion detection systems
    Ahmad, Rasheed
    Alsmadi, Izzat
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (06): : 7493 - 7519
  • [18] A Survey on Network Attacks and Intrusion Detection Systems
    Latha, S.
    Prakash, Sinthu Janita
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [19] Developing a Siamese Network for Intrusion Detection Systems
    Hindy, Hanan
    Tachtatzis, Christos
    Atkinson, Robert
    Bayne, Ethan
    Bellekens, Xavier
    PROCEEDINGS OF THE 1ST WORKSHOP ON MACHINE LEARNING AND SYSTEMS (EUROMLSYS'21), 2021, : 120 - 126
  • [20] Priorities in the deployment of network intrusion detection systems
    Dobrucki, M
    Virtanen, T
    SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 405 - 408