1995
DOI: 10.1109/32.372146
|View full text |Cite
|
Sign up to set email alerts
|

State transition analysis: a rule-based intrusion detection approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
226
0
10

Year Published

1999
1999
2009
2009

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 565 publications
(246 citation statements)
references
References 11 publications
1
226
0
10
Order By: Relevance
“…This graph has been constructed to express the dependencies and the different paths of combining beliefs for Rule 6. The graph reflects that the occurrence of E 2 in the rule depends on 7 Such events may typically appear in rules of the form ¬Happens(e1,t1,R(a,b)) ⇒ Happens(e2,t2,R(t1,t1+c)). The event ¬Happens(e1,t1,R(a,b)) in this rule has a time range with fully determined boundaries (a and b) prior to runtime and will remain as a negated event in the negated form of the rule, i.e., ¬Happens(e1,t1,R(a,b)) ∧ ¬Happens(e2,t2,R(t1,t1+c))…”
Section: Fig 146 D-s Belief Graph For Rulementioning
confidence: 99%
See 2 more Smart Citations
“…This graph has been constructed to express the dependencies and the different paths of combining beliefs for Rule 6. The graph reflects that the occurrence of E 2 in the rule depends on 7 Such events may typically appear in rules of the form ¬Happens(e1,t1,R(a,b)) ⇒ Happens(e2,t2,R(t1,t1+c)). The event ¬Happens(e1,t1,R(a,b)) in this rule has a time range with fully determined boundaries (a and b) prior to runtime and will remain as a negated event in the negated form of the rule, i.e., ¬Happens(e1,t1,R(a,b)) ∧ ¬Happens(e2,t2,R(t1,t1+c))…”
Section: Fig 146 D-s Belief Graph For Rulementioning
confidence: 99%
“…Intrusions are, thus, detected as deviations from the expected normal behaviour of the system. Misuse-based approaches [7,11,27], on the other hand, are based on models of known attacks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Misuse detection models the patterns of known attacks or vulnerabilities, and identifies actions that conform to such patterns as attacks. Existing approaches include rule-based methods (e.g., ASAX [26], P-BEST [25]), state transition based methods [5], [14], and data mining approaches [22], [23]. Most of these techniques cannot be directly applied to sensor networks due to the resource constraints on sensor nodes.…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…Since then, various IDS have been developed and a number of intrusion detection systems have directly employ this model e.g. [5] [6].…”
Section: Intrusion Detection System For Manetmentioning
confidence: 99%