A fuzzy description logic model for Intrusion Detection Systems

被引:0
|
作者
Baniasadi Z. [1 ]
Sanei A. [1 ]
Omidi M.R. [1 ]
机构
[1] Department of Computer Science, Shahid Bahonar University of Kerman, Kerman
关键词
Description Logics (DL); Fuzzy Description Logics; Fuzzy Logic (FL); Intrusion Detection System (IDS);
D O I
10.1109/ISTEL.2010.5734086
中图分类号
学科分类号
摘要
Today most managing network security systems, especially Intrusion Detection System (IDS), play a significant role in computer societies and due to the evolution of threats, the use of traditional crisp methods are not efficient. It is also clear that high level conceptual modeling eases the complex attack detection process. This paper proposes a new approach in which the benefits of both fuzzy and description logics are exploited in IDS in the form of simple model. Finally our example shows the main aim of attackers by categorizing attacks. © 2010 IEEE.
引用
收藏
页码:552 / 556
页数:4
相关论文
共 50 条
  • [41] Formal Representation of Fuzzy Data Model Using Description Logic
    Bhattacharya, Indira
    Ghosh, Soumya K.
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2013, PT IV, 2013, 7974 : 108 - 119
  • [42] Fuzzy Logic Based Intrusion Detection System as a Service for Malicious Port Scanning Traffic Detection
    Saidi, Firas
    Trabelsi, Zouheir
    Ben Ghazela, Henda
    2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [43] A Dynamic Fuzzy Description Logic
    FANG Wei
    Wuhan University Journal of Natural Sciences, 2008, (04) : 417 - 420
  • [44] The fuzzy description logic ALCFLH
    Hölldobler, S
    Nga, NH
    Khang, TD
    PROCEEDINGS OF THE NINTH IASTED INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING, 2005, : 99 - 104
  • [45] Fuzzy Reasoning in Description Logic
    Gasmi, Mohamed
    Bourahla, Mustapha
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (07): : 71 - 82
  • [46] Comprehensive evaluation of intrusion detection systems based on fuzzy methods
    School of Information Engineering, Beijing University of Science and Technology, Beijing 100083, China
    不详
    Jisuanji Gongcheng, 2006, 8 (155-156+234):
  • [47] Applications of fuzzy data mining methods for intrusion detection systems
    Guan, J
    Liu, DX
    Wang, T
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 3, 2004, 3045 : 706 - 714
  • [48] TCP/IP Model and Intrusion Detection Systems
    Zaman, Safaa
    Karray, Fakhri
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 90 - 96
  • [49] A model for anomaly classification in intrusion detection systems
    Ferreira, V. O.
    Galhardi, V. V.
    Goncalves, L. B. L.
    Silva, R. C.
    Cansian, A. M.
    4TH INTERNATIONAL CONFERENCE ON MATHEMATICAL MODELING IN PHYSICAL SCIENCES (IC-MSQUARE2015), 2015, 633
  • [50] Efficient Hybrid Model for Intrusion Detection Systems
    Kaaniche, Nesrine
    Boudguiga, Aymen
    Gonzalez-Granadillo, Gustavo
    SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 694 - 700