Plan Recognition in Intrusion Detection Systems Using Logic Programming

被引:0
|
作者
Chintabathina, Sandeep [1 ]
Walker, Jessie J. [1 ]
Villacis, Jorge [1 ]
Gomez, Hugo R. [1 ]
机构
[1] Univ Arkansas Pine Bluff, Dept Comp Sci, Pine Bluff, AR USA
关键词
Plan Recognition; Intrusion Detection; Logic Programming; A-Prolog;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we focus on logic programming based approach to plan recognition in intrusion detection systems. The goal of an intruder is to attack a computer or a network system for malicious reasons and the goal of the intrusion detection system is to detect the actions of the intruder and warn the network administrator of an impending attack. We show how an intrusion detection system can recognize the plans of the intruder by modeling the domain as a logic program and then reducing the plan recognition problem to computing models of the logic program. This methodology has been used widely for several planning problems and fits very naturally for plan recognition problems. We give an example scenario and show how to model it. Our results are quite satisfactory and we believe that our approach can lead to a generalized solution to plan recognition.
引用
收藏
页码:609 / 613
页数:5
相关论文
共 50 条
  • [1] Plan recognition in intrusion detection systems
    Geib, CW
    Goldman, RP
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 46 - 55
  • [2] A testbed for quantitative assessment of intrusion detection systems using fuzzy logic
    Singaraju, G
    Teo, L
    Zheng, YL
    SECOND IEEE INTERNATIONAL INFORMATION ASSURANCE WORKSHOP, PROCEEDINGS, 2004, : 79 - 93
  • [3] Modeling intrusion detection systems using linear genetic programming approach
    Mukkamala, S
    Sung, AH
    Abraham, A
    INNOVATIONS IN APPLIED ARTIFICIAL INTELLIGENCE, 2004, 3029 : 633 - 642
  • [4] A fuzzy description logic model for Intrusion Detection Systems
    Baniasadi Z.
    Sanei A.
    Omidi M.R.
    2010 5th International Symposium on Telecommunications, IST 2010, 2010, : 552 - 556
  • [5] A framework for hybrid fuzzy logic intrusion detection systems
    El-Semary, A
    Edmonds, J
    Gonzalez, J
    Papa, M
    FUZZ-IEEE 2005: PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS: BIGGEST LITTLE CONFERENCE IN THE WORLD, 2005, : 325 - 330
  • [6] Fuzzy Logic based Network Intrusion Detection Systems
    Johanyak, Zsolt Csaba
    2020 IEEE 18TH WORLD SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS (SAMI 2020), 2020, : 15 - 15
  • [7] Research of Wireless Intrusion Prevention Systems based on Plan Recognition and Honeypot
    Chen, Guanlin
    Yao, Hui
    Wang, Zebing
    2009 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2009), 2009, : 337 - +
  • [8] Intrusion detection using pattern recognition methods
    Jiang, Nan
    Yu, Li
    NEXT-GENERATION COMMUNICATION AND SENSOR NETWORKS 2007, 2007, 6773
  • [9] An Intelligent WLAN Intrusion Prevention System Based on Signature Detection and Plan Recognition
    Chen, Guanlin
    Yao, Hui
    Wang, Zebing
    SECOND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS: ICFN 2010, 2010, : 168 - 172
  • [10] Outlier detection using disjunctive logic programming
    Angiulli, F
    Ben-Eliyahu-Zohary, R
    Palopoli, L
    ECAI 2004: 16TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2004, 110 : 416 - 419