1,174 Hits in 5.1 sec

Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence [chapter]

Serguei A. Mokhov, Joey Paquet, Mourad Debbabi
2010 Lecture Notes in Computer Science  
Encoding and modeling large volumes of network and other data related to intrusion detection with Forensic Lucid for the purpose of event correlation and reconstruction along with trustworthiness factors  ...  of an incident in order to combine them into an evidential statement.  ...  Encoding and modeling large volumes of network and other data related to intrusion detection with Forensic Lucid for the purpose of event correlation and reconstruction along with trustworthiness factors  ... 
doi:10.1007/978-3-642-15512-3_36 fatcat:d5ghc24lyzht3dnbdby7zstani

Evidential Network Modeling for Cyber-Physical System State Inference

Ivo Friedberg, Xin Hong, Kieran Mclaughlin, Paul Smith, Paul C. Miller
2017 IEEE Access  
detection, and reliabilities into evidential networks.  ...  reasoning systems.  ...  Evidential Network Model In this section, we introduce an evidential network model that allows us to infer the state of the system, as described in Sect. 3.  ... 
doi:10.1109/access.2017.2718498 fatcat:qu266gc4dfg4fcxt6ho4xfgprm

PAID: A Probabilistic Agent-Based Intrusion Detection system

Vaibhav Gowadia, Csilla Farkas, Marco Valtorta
2005 Computers & security  
In this paper we describe architecture and implementation of a Probabilistic Agent-Based Intrusion Detection (PAID) system. The PAID system has a cooperative agent architecture.  ...  Agents are capable to perform soft-evidential update, thus providing a continuous scale for intrusion detection. We propose methods for modelling errors and resolving conflicts among beliefs.  ...  Any opinions, findings, conclusions, or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the U.S. Government.  ... 
doi:10.1016/j.cose.2005.06.008 fatcat:nrjvtfijd5ezdggdw556jbtqfu

Intrusion Detection Systems: Possibilities for the Future [chapter]

Karen A. Forcht, Christopher Allen, Barbara Brodman, David Corning, Jacob Kouns
2001 Advances in Information Security Management & Small Systems Security  
By combining artificial intelligence, neural networks and similar advances in programming, we can look forward to Intrusion Detection Systems that will not only raise the alarm, but take the appropriate  ...  Man has used Intrusion Detection Systems since the dawn of time.  ...  of determining an adequate solution "Artificial Intelligence is no match for natural stupidity" -Anonymous Active Evidential Reasoning Active Evidential Reasoning, inspired by model-based reasoning,  ... 
doi:10.1007/0-306-47007-1_14 fatcat:nwg4gxnbhfcpviuktvlwa34bae

Estimating risk of contaminant intrusion in water distribution networks using Dempster–Shafer theory of evidence

Rehan Sadiq, Yehuda Kleiner, Balvant Rajani
2006 Civil engineering and environmental systems (Print)  
B. Estimating risk of contaminant intrusion in water distribution networks using Dempster-Shafer theory of evidence NRCC-45408 Sadiq, R., Kleiner, Y. ; Rajani, B.  ...  lang=fr Access and use of this website and the material on it are subject to the Terms and Conditions set forth at Estimating risk of contaminant intrusion in distribution networks using Dempster-Shafer  ...  It is then followed by an application of evidential reasoning to contaminant intrusion in the distribution network. Finally, a summary section concludes the paper.  ... 
doi:10.1080/10286600600789276 fatcat:zcjbt54qcbfulf4gkvbjmsj3ue

Intelligent System to Detect Admission Fraud in Colleges of India

Harpreet Kaur, Mohita Garag, Harbhajan Kaur
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
Different modern fraud detection techniques have been applied to prevent frauds in various fields.  ...  In this paper, the survey of different fraud detection techniques has been presented. The goal of this paper is to review different existing techniques used to detect frauds.  ...  Garvey and Lunt combined models of misuse with evidential reasoning.  ... 
doi:10.23956/ijarcsse/v7i4/0133 fatcat:iqeapncq2zb4dix5revncg5vkq

Evidential Reasoning for Forensic Readiness

Yi-Ching Liao, Hanno Langweg
2016 Journal of Digital Forensics, Security and Law  
To learn from the past, we analyse 1,088 "computer as a target" judgments for evidential reasoning by extracting four case elements: decision, intent, fact, and evidence.  ...  Inspired by the feasibility of extracting legal knowledge for argument construction and employing grounds of inadmissibility for probability assessment, we conduct evidential reasoning of kernel traces  ...  For instance, we can use the detection rate and false alarm rate as input for the reliability module of the intrusion detection system database required for producing scenarios.  ... 
doi:10.15394/jdfsl.2016.1372 fatcat:h6slaxngsrewppreiunzkomymq

Detection Techniques against DDoS attacks: A Comprehensive Review

Shaveta Gupta, Dinesh Grover, Abhinav Bhandari
2014 International Journal of Computer Applications  
There are three solutions against DDoS attacks: Prevention, Detection and Reaction. Detection is one of the key steps in defending against DoS/ DDoS attacks.  ...  If attacks can be detected close to attack sources, attack traffic can be filtered before it wastes any network bandwidth.  ...  Model Based Reasoning System Combines models of misuse with evidential reasoning to support conclusions about occurrence of misuse. 1.  ... 
doi:10.5120/16794-6390 fatcat:3aqcjxazwbhtzo23yoiwimnb6q

Catching modern botnets using active integrated evidential reasoning

Yongning Tang, Guang Cheng, James T Yu, Bin Zhang
2013 Journal of Internet Services and Applications  
In this paper, we propose a novel active integrated evidential reasoning approach called SeeBot to detect modern botnets.  ...  SeeBot can seamlessly and incrementally combine host and network level evidences and incorporate active actions into passive evidential reasoning process to improve the efficiency and accuracy of botnet  ...  Traditional uncertainty reasoning approaches based on Bayesian Network and Dempster-Shafer theory are inapplicable to intrusion detection due to lack of prior knowledge [28] .  ... 
doi:10.1186/1869-0238-4-20 fatcat:probz7lzyzc3vfbeekhsxxygfe

Intrusion Detection using Sequential Hybrid Model [article]

Aditya Pandey, Abhishek Sinha, Aishwarya PS
2019 arXiv   pre-print
In order to further classify the intrusions, our approach to network intrusion detection includes use of two different anomaly detection models followed by misuse detection applied on the combined output  ...  We aim to detect a pattern in this novel intrusion technique itself, and not the handling of such intrusions. The intrusions were detected to a very high degree of accuracy.  ...  These are: • Expert Systems, which code knowledge about attacks as 'if-then' implication rules. • Model Based Reasoning Systems, which combine models of misuse with evidential reason-ing to support conclusions  ... 
arXiv:1910.12074v2 fatcat:v7nbmwpdy5bsnijv2yqkzq3ocy


Syed Ahmed Ali, Shahzad Memon, Lachhman Das Dhomeja, Djordje Djokic, Farhan Sahito
2022 Journal of Southwest Jiaotong University  
The framework integrates the components that can detect the attack on a cloud service earlier at ISP and store the logs of the incident in a forensic server which can be used for forensics purposes as  ...  Internet-based cloud technology is a network of remote data centers often placed beyond the country's legal frontiers worldwide.  ...  ACKNOWLEDGMENT The research conducted in this paper was triggered by the authors' involvement in the CC-Driver.  ... 
doi:10.35741/issn.0258-2724.57.2.8 fatcat:2soqcyqvobe4vb7x3wy7bxvgem

Feature Selection and Comparison of Classification Algorithms for Intrusion Detection

Sevcan Yılmaz Gündüz, Muhammet Nurullah ÇETER
2018 Anadolu University Journal of Science and Technology. A : Applied Sciences and Engineering  
The increase in the frequency of use of the Internet causes the attacks on computer networks to increase. Such phenomena also increase the importance of intrusion detection systems.  ...  In this paper, KDD Cup 99 dataset is used for the classification of the network attacks. Four different classification algorithms were used, and the results were compared.  ...  Network-based intrusion detection system plays a role in detecting all attacks in that network.  ... 
doi:10.18038/aubtda.356705 fatcat:geiu4arkd5andpf4uiqym6hyfq

Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise

Howard Chivers, John A. Clark, Philip Nobles, Siraj A. Shaikh, Hao Chen
2010 Information Systems Frontiers  
Information Systems Frontiers. pp.  ...  an intrusion detection system, or server log.  ...  An intrusion detection system (IDS) uses a behavioral model of a system or protocol and detects anomalous events by either recognizing predefined signatures, or by heuristics.  ... 
doi:10.1007/s10796-010-9268-7 fatcat:lrubrnjom5gurobk7jgxhjxwh4

A Systematic Survey on Sensor Failure Detection and Fault-Tolerance in Ambient Assisted Living

Nancy ElHady, Julien Provost
2018 Sensors  
This paper presents a systematic literature review of the sensor failure detection and fault tolerance in AAL equipped with non-intrusive, event-driven, binary sensors.  ...  Ambient Assisted Living (AAL) systems aim to enable the elderly people to stay active and live independently into older age by monitoring their behaviour, provide the needed assistance and detect early  ...  The sensor data was fed to the evidential reasoning network that is based on the Dempster-Shafer theory.  ... 
doi:10.3390/s18071991 pmid:29933622 pmcid:PMC6069464 fatcat:aclusns2qre3fj4ljtajm6hscm

Feature Optimization and Performance Improvement of a Multiclass Intrusion Detection System using PCA and ANN

Ravi KiranVarma.P, V. Valli Kumari
2012 International Journal of Computer Applications  
There are several bottle necks in the process of high speed intrusion detection, of which large dimensionality is one of the major problem.  ...  detection.  ...  INTRUSION DETECTION SYSTEM AND THE KDD DATA SET 2.1 Intrusion Detection System Intrusions Detection Systems still are the hot picks of the security administrators due to several reasons including no system  ... 
doi:10.5120/6321-8668 fatcat:huuqehn7x5h37b66mv7bhaibhm
« Previous Showing results 1 — 15 out of 1,174 results