A user-oriented ontology-based approach for network intrusion detection

被引:8
作者
Hung, Shao-Shin [1 ]
Liu, Damon Shing-Min [2 ]
机构
[1] WuFeng Inst Technol, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
user-oriented; ontology; network intrusion detection; intelligent reasoning;
D O I
10.1016/j.csi.2007.07.008
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A new approach is suggested for designing and developing an intrusion detection application where the domain expertise is used for generating it more easily. This approach uses ontologies as a way of grasping the knowledge of a domain, expressing the intrusion detection system much more in terms of the end users domain, generating the intrusion detection more easily and performing intelligent reasoning. Furthermore, ontologies are also used as a conceptual modeling tool allowing a non-expert person to model his/her intrusion detection application only using the concepts of intrusion detection more intuitively and more user-oriented towards his/her domain expertise. (C) 2007 Published by Elsevier B.V.
引用
收藏
页码:78 / 88
页数:11
相关论文
共 50 条
[1]  
[Anonymous], 2001, P 2001 WORKSHOP NEW
[2]  
[Anonymous], 2013, OVERVIEW ISSUES TEST
[3]  
[Anonymous], 23 ANN JOINT C IEEE
[4]  
ANTONATOS S, 2004, P 4 INT WORKSH SOFTW, P207
[5]  
Denker G, 2003, LECT NOTES COMPUT SC, V2870, P335
[6]   An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks [J].
Depren, O ;
Topallar, M ;
Anarim, E ;
Ciliz, MK .
EXPERT SYSTEMS WITH APPLICATIONS, 2005, 29 (04) :713-722
[7]   Security for industrial communications systems [J].
Dzung, D ;
Naedele, M ;
Von Hoff, TP ;
Crevatin, MC .
PROCEEDINGS OF THE IEEE, 2005, 93 (06) :1152-1177
[8]  
Filman R., 1996, P NEW SEC PAR WORKSH, P45
[9]  
FRIEDMANHILL E, 2006, JESS RULE ENGINE JAV
[10]   Efficient intrusion detection using automaton inlining [J].
Gopalakrishna, R ;
Spafford, EH ;
Vitek, J .
2005 IEEE Symposium on Security and Privacy, Proceedings, 2005, :18-31