CONDITIONAL RANDOM FIELDS BASED REAL-TIME INTRUSION DETECTION FRAMEWORK

被引:0
|
作者
Gu, Jiaojiao [1 ]
Jiang, Wenzhi [1 ]
Hu, Wenxuan [1 ]
Zhang, Xiaoyu [1 ]
机构
[1] Naval Aeronaut & Astronaut Univ, Yantai, Peoples R China
关键词
intrusion detection; anomaly; CRFs; Machine Learning; layered framework;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems are now an essential component in the all kinds of network even including wireless ad hoc network. With the rapid advancement in the network technologies the focus of intrusion detection has shifted from simple signature matching approaches to detecting attacks based on analyzing contextual information that employed in anomaly and hybrid intrusion detection approaches. This paper proposed a layered anomaly intrusion detection framework using Conditional Random Fields to detect a wide variety of attacks. With this framework attacks can be identified and intrusion response can be initiated in real time. Experiments show that the CRF model can detect attacks effectively.
引用
收藏
页码:186 / 189
页数:4
相关论文
共 50 条
  • [31] Intrusion Detection by Pipelined Approach Using Conditional Random Fields and Optimization Using SVM
    Jayaprakash, R.
    Uma, V.
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 656 - 665
  • [32] Real-time intrusion detection for ad hoc networks
    Stamouli, I
    Argyroudis, PG
    Tewari, H
    SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS, 2005, : 374 - 380
  • [33] Real-Time Intrusion Detection with Fuzzy Genetic Algorithm
    Jongsuebsuk, P.
    Wattanapongsakorn, N.
    Charnsripinyo, C.
    2013 10TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING/ELECTRONICS, COMPUTER, TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY (ECTI-CON), 2013,
  • [34] Real-Time Mode Diagnosis for Processes With Multiple Operating Conditions Using Switching Conditional Random Fields
    Fang, Mengqi
    Kodamana, Hariprasad
    Huang, Biao
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2020, 67 (06) : 5060 - 5070
  • [35] SVELTE: Real-time intrusion detection in the Internet of Things
    Raza, Shahid
    Wallgren, Linus
    Voigt, Thiemo
    AD HOC NETWORKS, 2013, 11 (08) : 2661 - 2674
  • [36] Online training of SVMs for real-time intrusion detection
    Zhang, ZH
    Shen, H
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1 (LONG PAPERS), PROCEEDINGS, 2004, : 568 - 573
  • [37] Robust real-time intrusion detection with fuzzy classification
    Milanesi, G
    Sarti, A
    Tubaro, S
    2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2002, : 437 - 440
  • [38] Real-time intrusion detection with emphasis on insider attacks
    Upadhyaya, S
    COMPUTER NETWORK SECURITY, 2003, 2776 : 82 - 85
  • [39] Towards Real-Time Intrusion Detection for NetFlow and IPFIX
    Hofstede, Rick
    Bartos, Vaclav
    Sperotto, Anna
    Pras, Aiko
    2013 9TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2013, : 227 - 234
  • [40] A Real-Time Intrusion Detection Algorithm for Network Security
    El-Bakry, Hazem M.
    Mastorakis, Nikos
    PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED INFORMATICS AND COMMUNICATIONS, PTS I AND II: NEW ASPECTS OF APPLIED INFORMATICS AND COMMUNICATIONS, 2008, : 533 - +