Proceedings of the 9th Joint International Conference on Information Sciences (JCIS-06) 2006
DOI: 10.2991/jcis.2006.118
|View full text |Cite
|
Sign up to set email alerts
|

A User-centric Intrusion Detection System by Using Ontology Approach

Abstract: In the security infrastructure, intrusion detection has become an indispensable defense line in face of increasing vulnerabilities exposed in today's computing systems and Internet. In this paper, our approach uses ontologies as a way of grasping the knowledge of a domain, expressing the intrusion detection system much more in terms of the end users domain, generating the intrusion detection more easily and performing intelligent reasoning. Experimental results show that our anomaly detection techniques are ve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…Such ontologies were in the past used to develop the ontology-based IDS. In Reference [21], authors present the DAML+OIL attack ontology and corresponding detection system applied on the KDD 99 data. The ontology includes high-level domain concepts (e.g., Attack, Host, Component, etc.)…”
Section: Related Workmentioning
confidence: 99%
“…Such ontologies were in the past used to develop the ontology-based IDS. In Reference [21], authors present the DAML+OIL attack ontology and corresponding detection system applied on the KDD 99 data. The ontology includes high-level domain concepts (e.g., Attack, Host, Component, etc.)…”
Section: Related Workmentioning
confidence: 99%
“…The major problem in the systems mentioned earlier is that the ontology is just used to represent a simple representation of the attributes of the attack McHugh [39] concentrated on the classification of attacks according to protocol layers. Guha and Mukherjee [31] focused on the analysis of each layer of the TCP/IP protocol stack as the groundwork for attack taxonomy.. The drawback of these systems is that they lack the reasoning ability which is very necessary to intelligently protect a system.…”
Section: Ontology Based Intrusion Detection Systems (Oids)mentioning
confidence: 99%
“…From a taxonomy point of view, intrusion detection possesses characters, classifications and languages that intelligently illustrate instances of taxonomy and convey information regarding an attack or intrusion in web application. Hung and Liu [31] introduced a new approach for designing and developing an intrusion detection application by using an ontology. The system conveys the intrusion detection in terms of the end users domain and allows a non-expert person to model the intrusion detection system easily by using the terminologies and concepts of intrusion detection.…”
Section: Ontology Based Intrusion Detection Systems (Oids)mentioning
confidence: 99%
“…However, theft capability is only the focus of this research work. Another detection method which is called Portable Executed (PE) file static attributes a new detection method which was presented by [8]. To analyze the static attribute in the Portable Executed (PE) file, an intelligent information processing technique is used.…”
Section: Introductionmentioning
confidence: 99%