Probabilistic inference strategy in distributed intrusion detection systems

被引:0
|
作者
Ding, JG [1 ]
Xu, SH
Krämer, B
Bai, YC
Chen, HS
Zhang, J
机构
[1] Shanghai Jiao Tong Univ, Shanghai 200030, Peoples R China
[2] Fern Univ Hagen, D-58084 Hagen, Germany
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The level of seriousness and sophistication of recent. cyber-attacks has risen dramatically over the past decade. This brings great challenges for network protection and the automatic security management. Quick and exact localization of intruder by an efficient intrusion detection system (IDS) will be great helpful to network manager. In this paper, Bayesian networks (BNs) are proposed to model the distributed intrusion detection based on the characteristic of intruders' behaviors. An inference strategy based on BNs are developed, which can be used to track the strongest causes (attack source) and trace the strongest dependency routes among the behavior sequences of intruders. This proposed algorithm can be the foundation for further intelligent decision in distributed intrusion detection.
引用
收藏
页码:835 / 844
页数:10
相关论文
共 50 条
  • [11] Intelligent Distributed Intrusion Detection Systems of Computer Communication Systems
    Grzech, Adam
    2009 FIRST ASIAN CONFERENCE ON INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2009, : 1 - 6
  • [12] Integration of Distributed Intrusion Detection Systems in IoT Infrastructure
    Bimenyimana, Christian Ildegard
    Nsabimana, Thierry
    Vlavonou, Ghislain
    Hounsou, Joel T.
    Niyonsaba, Gerard
    PROCEEDINGS OF NINTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, VOL 5, ICICT 2024, 2024, 1000 : 115 - 123
  • [13] The case for collaborative distributed wireless intrusion detection systems
    Beyah, Raheem A.
    Corbett, Cherita L.
    Copeland, John A.
    2006 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, 2006, : 782 - +
  • [14] Cooperating security managers: Distributed intrusion detection systems
    White, Gregory
    Pooch, Vdo
    Computers and Security, 15 (05): : 441 - 450
  • [15] Mobile agents community for distributed intrusion detection systems
    Benattou, M.
    Tamine, K.
    3RD INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL 1, PROCEEDINGS, 2005, : 347 - 351
  • [16] Improving energy efficiency in distributed intrusion detection systems
    Migliardi, Mauro
    Merlo, Alessio
    JOURNAL OF HIGH SPEED NETWORKS, 2013, 19 (03) : 251 - 264
  • [17] INTELLIGENT AGENTS FOR INTRUSION DETECTION IN DISTRIBUTED COMPUTER SYSTEMS
    Walkowiak, Tomasz
    Parazel, Artur
    Mazurkiewicz, Jacek
    MENDELL 2009, 2009, : 322 - 327
  • [18] Cooperating security managers: Distributed intrusion detection systems
    White, G
    Pooch, V
    COMPUTERS & SECURITY, 1996, 15 (05) : 441 - 450
  • [19] Probabilistic Estimation of Threat Intrusion in Embedded Systems for Runtime Detection
    Carreon, Nadir A.
    Lu, Sixing
    Lysecky, Roman
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2021, 20 (02)
  • [20] Predicate Detection in Asynchronous Distributed Systems: A Probabilistic Approach
    Zhu, Weiping
    Cao, Jiannong
    Raynal, Michel
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (01) : 173 - 186