Ontology Based Multi-Agent Intrusion Detection System for Web Service Attacks Using Self Learning

被引:8
作者
Brahmkstri, Krupa [1 ]
Thomas, Devasia [1 ]
Sawant, S. T. [1 ]
Jadhav, Avdhoot [1 ]
Kshirsagar, D. D. [1 ]
机构
[1] Coll Engn Pune, Dept Comp Engn & Informat Technol, Pune, Maharashtra, India
来源
NETWORKS AND COMMUNICATIONS (NETCOM2013) | 2014年 / 284卷
关键词
D O I
10.1007/978-3-319-03692-2_21
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Web Services (WS) have become a significant part of the Internet. They employ many features, each of them having specific drawbacks and security threats that are being exploited currently. According to current market researches majority of cyber attacks/exploits are done on these vulnerabilities in WS. Some are direct head on attacks while others are highly coordinated ones. To detect these attacks so that their further attempts can be prevented, highly intelligent Intrusion Detection Systems (IDS) are required. This can be done by having vast databases with high update frequencies or by employing a self learning ontology. Since, rules cannot be added to the database every minute and hence the ontology is preferred since attacks are of varying nature and new forms of attacks arise every day. For coordinated attacks, a single, stand alone IDS's becomes obsolete here. Hence the use of Distributed Intrusion Detection Systems (DIDS) along with firewalls is essential. The communication between these IDS's can be done using agents or any set standard of communication between these IDS's. On recognition of an attack on a single member or number of members of the DIDS System rules are added to the ontology knowledge base and learning occurs. This is the basic idea of an ontology based DIDS. The objective is to detect multiple kinds of attacks with good efficiency in least possible time practically.
引用
收藏
页码:265 / 274
页数:10
相关论文
共 16 条
[1]   Ontology-based Distributed Intrusion Detection System [J].
Abdoli, F. ;
Kahani, M. .
2009 14TH INTERNATIONAL COMPUTER CONFERENCE, 2009, :65-+
[2]  
[Anonymous], P 2 INT C SEM KNOWL
[3]  
de Azevedo R.R., 2010, INT J INFONOMICS IJI, V3
[4]  
Frye L, 2012, IEEE ICC, P6683, DOI 10.1109/ICC.2012.6364689
[5]   A TRANSLATION APPROACH TO PORTABLE ONTOLOGY SPECIFICATIONS [J].
GRUBER, TR .
KNOWLEDGE ACQUISITION, 1993, 5 (02) :199-220
[6]  
Hegazy IM, 2003, IEEE POTENTIALS, V22, P28, DOI 10.1109/MP.2003.1238690
[7]  
Miller P, 2003, NAFIPS'2003: 22ND INTERNATIONAL CONFERENCE OF THE NORTH AMERICAN FUZZY INFORMATION PROCESSING SOCIETY - NAFIPS PROCEEDINGS, P519
[8]   Hybrid multi-agent framework for detection of stealthy probes [J].
Mukkamala, Srinivas ;
Sung, Andrew H. ;
Abraham, Ajith .
APPLIED SOFT COMPUTING, 2007, 7 (03) :631-641
[9]  
Razzaq Abdul, 2011, 2011 Tenth International Symposium on Autonomous Decentralized Systems (ISADS), P95, DOI 10.1109/ISADS.2011.19
[10]   Open infrastructure for scalable intrusion detection [J].
Reilly, M ;
Stillman, M .
1998 IEEE INFORMATION TECHNOLOGY CONFERENCE, PROCEEDINGS, 1998, :129-133