A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques

被引:7
作者
Brahmi, Imen [1 ]
Brahmi, Hanen [1 ]
Ben Yahia, Sadok [2 ]
机构
[1] Fac Sci Tunis, Dept Comp Sci, Campus Univ, Tunis 1060, Tunisia
[2] TELECOM SudParis, Inst Mines TELECOM, UMR CNRS Samovar, F-91011 Evry, France
来源
COMPUTER SCIENCE AND ITS APPLICATIONS, CIIA 2015 | 2015年 / 456卷
关键词
Intrusion detection system; Multi-agents; Clustering; Ontology;
D O I
10.1007/978-3-319-19578-0_31
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, the increase in technology has brought more sophisticated intrusions. Consequently, Intrusion Detection Systems (IDS) are quickly becoming a popular requirement in building a network security infrastructure. Most existing IDS are generally centralized and suffer from a number of drawbacks, e.g., high rates of false positives, low efficiency, etc, especially when they face distributed attacks. This paper introduces a novel hybrid multi-agents IDS based on the intelligent combination of a clustering technique and an ontology model, called OCMAS-IDS. The latter integrates the desirable features provided by the multi-agents methodology with the benefits of semantic relations as well as the high accuracy of the data mining technique. Carried out experiments showed the efficiency of our distributed IDS, that sharply outperforms other systems over real traffic and a set of simulated attacks.
引用
收藏
页码:381 / 393
页数:13
相关论文
共 20 条
[1]   Ontology-based Distributed Intrusion Detection System [J].
Abdoli, F. ;
Kahani, M. .
2009 14TH INTERNATIONAL COMPUTER CONFERENCE, 2009, :65-+
[2]  
[Anonymous], 2012, BUSINESS INTELLIGENC
[3]  
[Anonymous], 2004, W3C MEMB SUBMISS
[4]  
Azad Chandrashekhar, 2013, International Journal of Information Technology and Computer Science, V5, P75, DOI 10.5815/ijitcs.2013.08.08
[5]  
Azevedoln R.R., 2010, INT J INFONOMICS, V3, P1
[6]  
Brahmi I., 2011, AT CLUST INCR METH D, P27
[7]  
Brahmi I, 2012, LECT NOTES ARTIF INT, V7103, P173
[8]   Ontology Based Multi-Agent Intrusion Detection System for Web Service Attacks Using Self Learning [J].
Brahmkstri, Krupa ;
Thomas, Devasia ;
Sawant, S. T. ;
Jadhav, Avdhoot ;
Kshirsagar, D. D. .
NETWORKS AND COMMUNICATIONS (NETCOM2013), 2014, 284 :265-274
[9]  
Djotio Thomas Ndie, 2008, International Journal of Advanced Media and Communication, V2, P288, DOI 10.1504/IJAMC.2008.020181
[10]  
Isaza G.A., 2010, J INFOR ASSURANCE SE, V5, P376