Contextual information fusion for intrusion detection: a survey and taxonomy

被引:28
作者
Aleroud, Ahmed [1 ]
Karabatis, George [2 ]
机构
[1] Yarmouk Univ, Dept Comp Informat Syst, Irbid 21163, Jordan
[2] UMBC, Dept Informat Syst, 1000 Hilltop Circle, Baltimore, MD 21250 USA
关键词
Context; Contextual information; Cyber-security; Netflows; Intrusion detection; Semantics; SUPPORT VECTOR MACHINE; ANOMALY DETECTION; NEURAL-NETWORKS; SYSTEM; CLASSIFICATION; MODEL; VISUALIZATION; ALGORITHMS; FRAMEWORK; SELECTION;
D O I
10.1007/s10115-017-1027-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Research in cyber-security has demonstrated that dealing with cyber-attacks is by no means an easy task. One particular limitation of existing research originates from the uncertainty of information that is gathered to discover attacks. This uncertainty is partly due to the lack of attack prediction models that utilize contextual information to analyze activities that target computer networks. The focus of this paper is a comprehensive review of data analytics paradigms for intrusion detection along with an overview of techniques that apply contextual information for intrusion detection. A new research taxonomy is introduced consisting of several dimensions of data mining techniques, which create attack prediction models. The survey reveals the need to use multiple categories of contextual information in a layered manner with consistent, coherent, and feasible evidence toward the correct prediction of cyber-attacks.
引用
收藏
页码:563 / 619
页数:57
相关论文
共 313 条
[1]   Ontology-based Distributed Intrusion Detection System [J].
Abdoli, F. ;
Kahani, M. .
2009 14TH INTERNATIONAL COMPUTER CONFERENCE, 2009, :65-+
[2]   Visualizing network data for intrusion detection [J].
Abdullah, K ;
Lee, A ;
Conti, G ;
Copeland, JA .
PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, :100-108
[3]  
Abouzakhar NS, 2003, P POSTGRADUATE NETW
[4]  
Adetunmbi A.O., 2008, International Journal of Computing and ICT Research, V2, P60
[5]  
Agrawal R., 1994, P 20 INT C VER LARG, V1215, P487, DOI DOI 10.5555/645920.672836
[6]  
Agrawal Rakesh., 1993, P 1993 ACM SIGMOD IN, P207, DOI DOI 10.1145/170035.170072
[7]   Host Based Intrusion Detection Using RBF Neural Networks [J].
Ahmed, Usman ;
Masood, Asif .
ICET: 2009 INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES, PROCEEDINGS, 2009, :48-51
[8]  
Al-Subaie M, 2006, P INT COMP SOFTW APP, P325
[9]  
Albayrak S., 2005, International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06), V2, P123, DOI 10.1109/CIMCA.2005.1631456
[10]   Context and semantics for detection of cyber attacks [J].
Aleroud, Ahmed ;
Karabatis, George ;
Sharma, Prayank ;
He, Peng .
International Journal of Information and Computer Security, 2014, 6 (01) :63-92