Activity profiles for intrusion detection

作者: L.J. Kohout , A. Yasinsac , E. McDuffie

DOI: 10.1109/NAFIPS.2002.1018104

关键词:

摘要: We propose a methodology to perform behavior-based intrusion detection on security protocols using fuzzy relational methods. Fuzzified Allen temporal algebra plays an important role in capturing the time dimension of concurrent activities principals as well intruders.

参考文章(10)
Benjoe A. Wyllis Bandler Juliano, Wyllis Bandler, Benjoe A. Juliano, Tracing Chains-of-Thought: Fuzzy Methods in Cognitive Diagnosis ,(1996)
Wyllis Bandler, Ladislav J. Kohout, John Anderson, Knowledge-Based Systems for Multiple Environments ,(2019)
Alec Yasinsac, An environment for security protocol intrusion detection Journal of Computer Security. ,vol. 10, pp. 177- 188 ,(2002) , 10.3233/JCS-2002-101-208
L. Kohout, B. R. Gaines, The Logic of Protection GI - 5. Jahrestagung. pp. 736- 751 ,(1975) , 10.1007/3-540-07410-4_672
LADISLAV J. KOHOUT, BRIAN R. GAINES, PROTECTION AS A GENERAL SYSTEMS PROBLEM International Journal of General Systems. ,vol. 3, pp. 3- 23 ,(1976) , 10.1080/03081077608934734
G. Scott Graham, Peter J. Denning, Protection Proceedings of the November 16-18, 1971, fall joint computer conference on - AFIPS '71 (Fall). pp. 417- 429 ,(1971) , 10.1145/1478873.1478928
PETR VOPĚNKA, THE PHILOSOPHICAL FOUNDATIONS OF ALTERNATIVE SET THEORY International Journal of General Systems. ,vol. 20, pp. 115- 126 ,(1991) , 10.1080/03081079108945019
D.E. Denning, An Intrusion-Detection Model IEEE Transactions on Software Engineering. ,vol. 13, pp. 222- 232 ,(1987) , 10.1109/TSE.1987.232894
James F. Allen, Maintaining knowledge about temporal intervals Communications of the ACM. ,vol. 26, pp. 832- 843 ,(1983) , 10.1145/182.358434