Probabilistic inference strategy in distributed intrusion detection systems

被引:0
|
作者
Ding, JG [1 ]
Xu, SH
Krämer, B
Bai, YC
Chen, HS
Zhang, J
机构
[1] Shanghai Jiao Tong Univ, Shanghai 200030, Peoples R China
[2] Fern Univ Hagen, D-58084 Hagen, Germany
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The level of seriousness and sophistication of recent. cyber-attacks has risen dramatically over the past decade. This brings great challenges for network protection and the automatic security management. Quick and exact localization of intruder by an efficient intrusion detection system (IDS) will be great helpful to network manager. In this paper, Bayesian networks (BNs) are proposed to model the distributed intrusion detection based on the characteristic of intruders' behaviors. An inference strategy based on BNs are developed, which can be used to track the strongest causes (attack source) and trace the strongest dependency routes among the behavior sequences of intruders. This proposed algorithm can be the foundation for further intelligent decision in distributed intrusion detection.
引用
收藏
页码:835 / 844
页数:10
相关论文
共 50 条
  • [41] An intelligent infrastructure strategy to improving the performance and detection capability of intrusion detection systems
    Hooper, Emmanuel
    2006 SECURECOMM AND WORKSHOPS, 2006, : 355 - 364
  • [42] A framework for designing resilient distributed intrusion detection systems for critical infrastructures
    Genge, Bela
    Haller, Piroska
    Kiss, Istvan
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2016, 15 : 3 - 11
  • [43] Attack and Defense Strategies for Intrusion Detection in Autonomous Distributed IoT Systems
    Al-Hamadi, Hamid
    Chen, Ing-Ray
    Wang, Ding-Chau
    Almashan, Meshal
    IEEE ACCESS, 2020, 8 : 168994 - 169009
  • [44] Autonomous Federated Learning for Distributed Intrusion Detection Systems in Public Networks
    Mahmoodi, Alireza Bakhshi Zadi
    Sheikhi, Saeid
    Peltonen, Ella
    Kostakos, Panos
    IEEE ACCESS, 2023, 11 : 121325 - 121339
  • [45] Anomaly-based Intrusion Detection using Distributed intelligent systems
    Morel, Benoit
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 37 - 44
  • [46] Intrusion Detection Systems' Performance for Distributed Denial-of-Service Attack
    de Sousa Araujo, Tiago Emilio
    Matos, Fernando Menezes
    Moreira, Josilene Aires
    2017 CHILEAN CONFERENCE ON ELECTRICAL, ELECTRONICS ENGINEERING, INFORMATION AND COMMUNICATION TECHNOLOGIES (CHILECON), 2017,
  • [47] Hybrid Intrusion Detection System Design for Distributed Energy Resource Systems
    Chavez, A.
    Lai, C.
    Jacobs, N.
    Hossain-McKenzie, S.
    Jones, C. B.
    Johnson, J.
    Summers, A.
    2019 IEEE CYBERPELS (CYBERPELS), 2019,
  • [48] Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs
    Zhang, Tao
    Zhu, Quanyan
    IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2018, 4 (01): : 148 - 161
  • [49] Intrusion detection systems - Introduction to intrusion detection and analysis
    Debar, H
    SECURITY AND PRIVACY IN ADVANCED NETWORKING TECHNOLOGIES, 2004, 193 : 161 - 177
  • [50] Intrusion detection systems
    IEEE Intelligent Systems and Their Applications, 2001, 16 (01):