Evidential reasoning in network intrusion detection systems

被引:0
|
作者
Esmaili, M [1 ]
Safavi-Naini, R [1 ]
Pieprzyk, J [1 ]
机构
[1] Univ Wollongong, Ctr Comp Secur Res, Wollongong, NSW 2522, Australia
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intrusion Detection Systems (IDS) have previously been built by hand. These systems have difficulty successfully classifying intruders, and require a significant amount of computational overhead making it difficult to create robust real-time IDS systems. Artificial Intelligence techniques can reduce the human effort required to build these systems and can improve their performance. AI has recently been used in Intrusion Detection (ID) for anomaly detection, data reduction and induction, or discovery, of rules explaining audit data [1]. This paper proposes the application of evidential reasoning for dealing with uncertainty in Intrusion Detection Systems. We show how dealing with uncertainty can allow the system to detect the abnormality in the user behavior more efficiently.
引用
收藏
页码:253 / 265
页数:13
相关论文
共 50 条
  • [31] Automated Technique for Debugging Network Intrusion Detection Systems
    Nehinbe, Joshua Ojo
    UKSIM-AMSS FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS, MODELLING AND SIMULATION, 2010, : 362 - 367
  • [32] Adversarial machine learning in Network Intrusion Detection Systems
    Alhajjar, Elie
    Maxwell, Paul
    Bastian, Nathaniel
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 186
  • [33] Neural network-based intrusion detection systems
    Hu, LX
    He, ZJ
    COMPUTER SCIENCE AND TECHNOLOGY IN NEW CENTURY, 2001, : 296 - 298
  • [34] Soft computing models for network intrusion detection systems
    Abraham, A
    Jain, R
    Classification and Clustering for Knowledge Discovery, 2005, 4 : 191 - 207
  • [35] Methods for Testing Network-Intrusion Detection Systems
    Khorkov, D. A.
    SCIENTIFIC AND TECHNICAL INFORMATION PROCESSING, 2012, 39 (02) : 120 - 126
  • [36] Predicting the Resource Consumption of Network Intrusion Detection Systems
    Dreger, Holger
    Feldmann, Anja
    Paxson, Vern
    Sommer, Robin
    SIGMETRICS'08: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON MEASUREMENT & MODELING OF COMPUTER SYSTEMS, 2008, 36 (01): : 437 - 438
  • [37] Signal Processing Applications in Network Intrusion Detection Systems
    Huang, Chin-Tser
    Chang, Rocky K. C.
    Huang, Polly
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2009,
  • [38] Class Imbalance Problem in the Network Intrusion Detection Systems
    Rodda, Sireesha
    Erothi, Uma Shankar Rao
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 2685 - 2688
  • [39] Intrusion detection and prevention systems in industrial IoT network
    Sharma, Sangeeta
    Kumar, Ashish
    Rathore, Navdeep Singh
    Sharma, Shivanshu
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2024, 49 (03):
  • [40] Signal Processing Applications in Network Intrusion Detection Systems
    Chin-Tser Huang
    Rocky K.C. Chang
    Polly Huang
    EURASIP Journal on Advances in Signal Processing, 2009