메뉴 건너뛰기




Volumn , Issue , 2009, Pages 65-70

Ontology-based distributed intrusion detection system

Author keywords

Denial of service attack; Intrusion detection system; Ontology

Indexed keywords

COMPUTER ATTACKS; DENIAL OF SERVICE ATTACKS; DISTRIBUTED INTRUSION DETECTION SYSTEMS; FALSE NEGATIVES; FALSE POSITIVE; INTRUSION DETECTION SYSTEMS; ONTOLOGY-BASED; SEMANTIC RELATIONS; SEMANTIC RELATIONSHIPS;

EID: 74749087116     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSICC.2009.5349372     Document Type: Conference Paper
Times cited : (40)

References (27)
  • 1
    • 26944484588 scopus 로고    scopus 로고
    • Modeling Computer Attacks: An Ontology for Intrusion Detection
    • Undercoffer. J, Joshi. A, Pinkston. J, "Modeling Computer Attacks: An Ontology for Intrusion Detection," Springer, pp. 113-135, 2003.
    • (2003) Springer , pp. 113-135
    • Undercoffer, J.1    Joshi, A.2    Pinkston, J.3
  • 2
    • 19544392472 scopus 로고    scopus 로고
    • A target centric ontology for intrusion detection: Using DAML+OIL to classify intrusive behaviors
    • Cambridge University Press, pp, January
    • J. Undercoffer, A. Joshi,, T. Finin, and John Pinkston, "A target centric ontology for intrusion detection: using DAML+OIL to classify intrusive behaviors," Knowledge Engineering Review, Cambridge University Press, pp. 23-29, January, 2004.
    • (2004) Knowledge Engineering Review , pp. 23-29
    • Undercoffer, J.1    Joshi, A.2    Finin, T.3    Pinkston, J.4
  • 4
    • 0242456149 scopus 로고    scopus 로고
    • V. Raskin, C. Helpenmann, K. Triezenberg, and S. Nirenburg, Ontology in information security: a useful theoretical foundation and methodological tool, New Security Paradigms Workshop, ACM Press, pp. 53-59, Cloudcroft, NM, 2001.
    • V. Raskin, C. Helpenmann, K. Triezenberg, and S. Nirenburg, "Ontology in information security: a useful theoretical foundation and methodological tool", New Security Paradigms Workshop, ACM Press, pp. 53-59, Cloudcroft, NM, 2001.
  • 5
    • 24144468632 scopus 로고    scopus 로고
    • Extracting and querying network attack scenarios knowledge in IDS using PCTCG and alert semantic networks
    • Yan, W., Hou, E., Ansari, N., "Extracting and querying network attack scenarios knowledge in IDS using PCTCG and alert semantic networks," IEEE International Conference 2005.
    • (2005) IEEE International Conference
    • Yan, W.1    Hou, E.2    Ansari, N.3
  • 6
    • 74749093507 scopus 로고    scopus 로고
    • Yanxiang.H, Wei.C, Min.Y and Wenling.P ,Ontology Based Cooperative Intrusion Detection System, Network and Parallel Computing, 2004 springerlink
    • Yanxiang.H, Wei.C, Min.Y and Wenling.P ,"Ontology Based Cooperative Intrusion Detection System," Network and Parallel Computing, 2004 springerlink
  • 8
    • 74749086368 scopus 로고    scopus 로고
    • IDS, Intrusion Detection System
    • Klaus. M, IDS - Intrusion Detection System, 2005
    • (2005)
    • Klaus, M.1
  • 9
    • 33745725639 scopus 로고    scopus 로고
    • Anagnostopoulos, T.; Anagnostopoulos, C.; Hadjiefthymiades, S., Enabling attack behavior prediction in ubiquitous environments, Pervasive Services, ICPS '05. 2005.
    • Anagnostopoulos, T.; Anagnostopoulos, C.; Hadjiefthymiades, S., "Enabling attack behavior prediction in ubiquitous environments, "Pervasive Services, ICPS '05. 2005.
  • 10
    • 0038458145 scopus 로고    scopus 로고
    • Evolving Fuzzy Classifiers for Intrusion Detection
    • United States Military Academy, West Point NY, June
    • Gomez J., Dasgupta D., "Evolving Fuzzy Classifiers for Intrusion Detection," Proceeding Of 2002 IEEE Workshop on Information Assurance, United States Military Academy, West Point NY, June 2001.
    • (2001) Proceeding Of 2002 IEEE Workshop on Information Assurance
    • Gomez, J.1    Dasgupta, D.2
  • 11
    • 0141540496 scopus 로고    scopus 로고
    • Guan Y., Ghorbani A. And Belacel N., Y-means: A Clustering Method for Intrusion Detection, Proceedings of Canadian Conference on Electrical and Computer Engineering. Montreal, Quebec, Canada. May 4-7, 2003.
    • Guan Y., Ghorbani A. And Belacel N., "Y-means: A Clustering Method for Intrusion Detection," Proceedings of Canadian Conference on Electrical and Computer Engineering. Montreal, Quebec, Canada. May 4-7, 2003.
  • 12
    • 6344266104 scopus 로고
    • State Transition Analysis: A Rule-Based Intrusion Detection Approach
    • March
    • Ilgun K., Kemmerer R.A., and Porras P.A., "State Transition Analysis: A Rule-Based Intrusion Detection Approach," IEEE Transaction on Software Engineering, Vol 2, No 3, 21(3), March 1995.
    • (1995) IEEE Transaction on Software Engineering , vol.2 , Issue.3-3 , pp. 21
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 14
    • 27544490151 scopus 로고    scopus 로고
    • NFIDS: A Neuro-Fuzzy Intrusion Detection System
    • Mohajerani M., Morini A., Kianie M. "NFIDS: A Neuro-Fuzzy Intrusion Detection System," IEEE 2003.
    • (2003) IEEE
    • Mohajerani, M.1    Morini, A.2    Kianie, M.3
  • 16
    • 74749109910 scopus 로고    scopus 로고
    • 09-Ashbindu-GEAS-19 October - The advantage of standard format alerts. www.oasis-open.org/events/ITU-T-
    • 09-Ashbindu-GEAS-19 October - The advantage of standard format alerts. www.oasis-open.org/events/ITU-T-
  • 17
    • 74749110062 scopus 로고    scopus 로고
    • Simon H, Ray , A taxonomy of network and computer attacks, Elsevier, Computers & Security (2005) 24, 31e43
    • Simon H, Ray ," A taxonomy of network and computer attacks, "Elsevier, Computers & Security (2005) 24, 31e43
  • 19
    • 74749103320 scopus 로고    scopus 로고
    • DU.Y, WANG. H, PANG. Y, Design of A Distributed Intrusion Detection System Based on Independent Agents, IEEE 2004.
    • DU.Y, WANG. H, PANG. Y, "Design of A Distributed Intrusion Detection System Based on Independent Agents," IEEE 2004.
  • 20
    • 74749104552 scopus 로고    scopus 로고
    • http://protege.stanford.edu
  • 21
    • 74749092433 scopus 로고    scopus 로고
    • kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
  • 22
    • 71249154913 scopus 로고    scopus 로고
    • A. Nadjaran..T, M.Kahani, R.Monsefi ,Network Intrusion Detection Based on Neuro- Fuzzy Classification, ICOCI2006 Kuala Lumpur, Malaysia, June 6-8, 2006
    • A. Nadjaran..T, M.Kahani, R.Monsefi ,"Network Intrusion Detection Based on Neuro- Fuzzy Classification," ICOCI2006 (Kuala Lumpur, Malaysia, June 6-8, 2006
  • 24
    • 0347606556 scopus 로고    scopus 로고
    • Winning the KDD99 Classification Cup: Bagged Boosting
    • Pfahringer B., Winning the KDD99 Classification Cup: Bagged Boosting, SIGKDD explorations, 1(2), 65-66, 2000.
    • (2000) SIGKDD explorations , vol.1 , Issue.2 , pp. 65-66
    • Pfahringer, B.1
  • 25
    • 1642354876 scopus 로고    scopus 로고
    • KDD-99 Classifier Learning Contest LLSoft's Results Overview, SIGKDD Explorations
    • Levin I., KDD-99 Classifier Learning Contest LLSoft's Results Overview, SIGKDD Explorations, ACM SIGKDD, 1(2) 67-75, 2000.
    • (2000) ACM SIGKDD , vol.1 , Issue.2 , pp. 67-75
    • Levin, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.