Specific attack adjusted Bayesian network for intrusion detection system

被引:0
|
作者
Tuba, Milan [1 ]
Bulatovic, Dusan [1 ]
Miljkovic, Olga [1 ]
Simian, Dana [1 ]
机构
[1] Univ Belgrade, Fac Math, Studentski Trg 16, Belgrade 11001, Serbia
来源
MATHEMATICS AND COMPUTERS IN BIOLOGY AND CHEMISTRY | 2008年
关键词
privacy; security; networks; data protection; Bayesian network; intrusion detection system (IDS);
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper further examines Suitability of Bayesian networks for intrusion detection in computer networks. It is a continuation of [1]. Medical records should be readily available but also well protected, which are contrdictory goals. Automatic intrusion detection system (IDS) is required, but all used approaches have certain shortcomings. Bayesian networks are known to have good features, except that in general case are computationally too expensive. Here we show that limiting intrusion detection to any specific attack makes Bayesian networks manageable and suitable for the IDS. Example network is constructed and examined. Results are promising since with very limited computation and low sensitivity to the quality of prior knowledge, potentially dangerous Situations are successfully detected and classified. Such Bayesian network can represent an independent agent in a distributed system.
引用
收藏
页码:107 / +
页数:3
相关论文
共 50 条
  • [31] The sound of intrusion: A novel network intrusion detection system
    Aldarwbi, Mohammed Y.
    Lashkari, Arash H.
    Ghorbani, Ali A.
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [32] Comparative study between Bayesian network and possibilistic network in intrusion detection
    Arfaoui, Najla
    Jemili, Farah
    Zaghdoud, Montaceur
    Ben Ahmed, Mohamed
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 24 - +
  • [33] Attack Graph Algorithm in the Application of Intrusion Detection System
    Luo Zhiyong
    You Bo
    Xu Jiazhong
    Yu Guixin
    Liu Yahui
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 249 - 256
  • [34] Minimal complexity attack classification intrusion detection system
    Gowrison, G.
    Ramar, K.
    Muneeswaran, K.
    Revathi, T.
    APPLIED SOFT COMPUTING, 2013, 13 (02) : 921 - 927
  • [35] A Poisoning Attack on Intrusion Detection System Based on SVM
    Qian Y.-G.
    Lu H.-B.
    Ji S.-L.
    Zhou W.-J.
    Wu S.-H.
    Lei J.-S.
    Tao X.-X.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2019, 47 (01): : 59 - 65
  • [36] A Proposed Wireless Intrusion Detection Prevention and Attack System
    Nada, Jafar Abo
    Al-Mosa, Mohammad Rasmi
    2018 19TH INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2018, : 211 - 215
  • [37] PANDA: Practical Adversarial Attack Against Network Intrusion Detection
    Swain, Subrat Kumar
    Kumar, Vireshwar
    Bai, Guangdong
    Kim, Dan Dongseong
    2024 54TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS-SUPPLEMENTAL VOLUME, DSN-S 2024, 2024, : 28 - 32
  • [38] PIECEWISE CLASSIFICATION OF ATTACK PATTERNS FOR EFFICIENT NETWORK INTRUSION DETECTION
    Zaidi, Abdelhalim
    Agoulmine, Nazim
    Kenaza, Tayeb
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 100 - 104
  • [39] Parallelization of Network Intrusion Detection Systems under Attack Conditions
    Rietz, Rene
    Vogel, Michael
    Schuster, Franka
    Koenig, Hartmut
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2014, 2014, 8550 : 172 - 191
  • [40] Intrusion Detection Algorithm for the Wormhole Attack in Ad Hoc Network
    Liu, Jun
    Chen, Huiting
    Zhen, Zhong
    Sha, Mingbo
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 : 147 - 154