CONDITIONAL RANDOM FIELDS BASED REAL-TIME INTRUSION DETECTION FRAMEWORK

被引:0
|
作者
Gu, Jiaojiao [1 ]
Jiang, Wenzhi [1 ]
Hu, Wenxuan [1 ]
Zhang, Xiaoyu [1 ]
机构
[1] Naval Aeronaut & Astronaut Univ, Yantai, Peoples R China
关键词
intrusion detection; anomaly; CRFs; Machine Learning; layered framework;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion detection systems are now an essential component in the all kinds of network even including wireless ad hoc network. With the rapid advancement in the network technologies the focus of intrusion detection has shifted from simple signature matching approaches to detecting attacks based on analyzing contextual information that employed in anomaly and hybrid intrusion detection approaches. This paper proposed a layered anomaly intrusion detection framework using Conditional Random Fields to detect a wide variety of attacks. With this framework attacks can be identified and intrusion response can be initiated in real time. Experiments show that the CRF model can detect attacks effectively.
引用
收藏
页码:186 / 189
页数:4
相关论文
共 50 条
  • [41] A Bayesian classification model for real-time intrusion detection
    Puttini, RS
    Marrakchi, Z
    Mé, L
    BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING, 2003, 659 : 150 - 162
  • [42] Network intrusion intelligent real-time detection system
    Zhao, Haibo
    Li, Jianhua
    Yang, Yuhang
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 1999, 33 (01): : 76 - 79
  • [43] Performance adaptation in real-time intrusion detection systems
    Lee, W
    Cabrera, JBD
    Thomas, A
    Balwalli, N
    Saluja, S
    Zhang, Y
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2002, 2516 : 252 - 273
  • [44] Real-time intrusion detection and suppression in ATM networks
    Bettati, R
    Zhao, W
    Teodor, D
    PROCEEDINGS OF THE WORKSHOP ON INTRUSION DETECTION AND NETWORK MONITORING (ID '99), 1999, : 111 - 118
  • [45] Real-Time Intrusion Detection in Power System Operations
    Valenzuela, Jorge
    Wang, Jianhui
    Bissinger, Nancy
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2013, 28 (02) : 1052 - 1062
  • [46] A real-time intrusion detection algorithm for network security
    El-Bakry, Hazem M.
    Mastorakis, Nikos
    2008, WSEAS (07):
  • [47] Fuzzy frequent episodes for real-time intrusion detection
    Luo, JX
    Bridges, SM
    Vaughn, RB
    10TH IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-3: MEETING THE GRAND CHALLENGE: MACHINES THAT SERVE PEOPLE, 2001, : 368 - 371
  • [48] Real-time pose invariant spontaneous smile detection using conditional random regression forests
    Liu, Leyuan
    Gui, Wenting
    Zhang, Li
    Chen, Jingying
    OPTIK, 2019, 182 : 647 - 657
  • [49] A Novel Research on Real-Time Intrusion Detection Technology Based on Data Mining
    Yi, Julan
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2015), 2015, 33 : 881 - 885
  • [50] Hadoop Based Real-time Intrusion Detection for High-speed Networks
    Rathore, M. Mazhar
    Paul, Anand
    Ahmad, Awais
    Rho, Seungmin
    Imran, Muhammad
    Guizani, Mohsen
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,