Probabilistic inference strategy in distributed intrusion detection systems

被引:0
|
作者
Ding, JG [1 ]
Xu, SH
Krämer, B
Bai, YC
Chen, HS
Zhang, J
机构
[1] Shanghai Jiao Tong Univ, Shanghai 200030, Peoples R China
[2] Fern Univ Hagen, D-58084 Hagen, Germany
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The level of seriousness and sophistication of recent. cyber-attacks has risen dramatically over the past decade. This brings great challenges for network protection and the automatic security management. Quick and exact localization of intruder by an efficient intrusion detection system (IDS) will be great helpful to network manager. In this paper, Bayesian networks (BNs) are proposed to model the distributed intrusion detection based on the characteristic of intruders' behaviors. An inference strategy based on BNs are developed, which can be used to track the strongest causes (attack source) and trace the strongest dependency routes among the behavior sequences of intruders. This proposed algorithm can be the foundation for further intelligent decision in distributed intrusion detection.
引用
收藏
页码:835 / 844
页数:10
相关论文
共 50 条
  • [1] Research on the strategy of large-scale distributed intrusion detection systems
    Zhu, Wen-Tao
    Li, Jin-Sheng
    Hong, Pei-Lin
    2003, Shenyang Institute of Computing Technology (24):
  • [2] A Hierarchical Architecture and Probabilistic Strategy for Collaborative Intrusion Detection
    Hardegen, Christoph
    Petersen, Mike
    Ezelu, Chukwuebuka
    Geier, Timo
    Rieger, Sebastian
    Buehler, Ulrich
    2021 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2021, : 128 - 136
  • [3] Distributed and collaborative intrusion detection systems
    Farroukh, Amer
    Mukadam, Nabil
    Bassil, Elie
    Elhajj, Imad H.
    2008 IEEE LEBANON COMMUNICATIONS WORKSHOP, 2008, : 41 - 45
  • [4] An inference algorithm for probabilistic fault management in distributed systems
    Ding, JG
    Krämer, B
    Bai, YC
    Chen, HS
    NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY, III, 2005, 165 : 193 - 204
  • [5] DEVS simulation of distributed intrusion detection systems
    Cho, TH
    Kim, HJ
    SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL, 2001, 18 (03): : 133 - 146
  • [6] DEVS simulation of distributed intrusion detection systems
    Cho, Tae Ho
    Kim, Hyung Jong
    Transactions of the Society for Computer Simulation, 2002, 18 (03): : 133 - 146
  • [7] Information sharing for distributed intrusion detection systems
    Peng, Tao
    Leckie, Christopher
    Ramamohanarao, Kotagiri
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) : 877 - 899
  • [9] GP ensemble for distributed intrusion detection systems
    Folino, G
    Pizzuti, C
    Spezzano, G
    PATTERN RECOGNITION AND DATA MINING, PT 1, PROCEEDINGS, 2005, 3686 : 54 - 62
  • [10] Intrusion detection systems for the internet of things: a probabilistic anomaly detection approach
    Bali, Nadia
    Jaoua, Zied
    Bzeouich, Olfa
    Abbassi, Imed
    International Journal of Computers and Applications, 2024, 46 (11) : 933 - 944