Analyzing host security using D‐S evidence theory and multisource information fusion

作者: Yuanzhang Li , Shangjun Yao , Ruyun Zhang , Chen Yang

DOI: 10.1002/INT.22330

关键词:

摘要: … of deviation, we use the multisource information fusion method. Different machine learning models are used as sensors of DS evidence theory, and the values of multiple sensors are …

参考文章(32)
Daesung Moon, Sung Bum Pan, Ikkyun Kim, Host-based intrusion detection system for secure human-centric computing The Journal of Supercomputing. ,vol. 72, pp. 2520- 2536 ,(2016) , 10.1007/S11227-015-1506-9
Prachi Deshpande, S. C. Sharma, S. K. Peddoju, S. Junaid, HIDS: A host based intrusion detection system for cloud computing environment International Journal of Systems Assurance Engineering and Management. ,vol. 9, pp. 567- 576 ,(2018) , 10.1007/S13198-014-0277-7
Yang-jia Ou, Ying Lin, Yan Zhang, Yang-jia Ou, The Design and Implementation of Host-Based Intrusion Detection System international symposium on intelligent information technology and security informatics. pp. 595- 598 ,(2010) , 10.1109/IITSI.2010.127
Dit-Yan Yeung, Yuxin Ding, Host-based intrusion detection using dynamic and static behavioral models Pattern Recognition. ,vol. 36, pp. 229- 243 ,(2003) , 10.1016/S0031-3203(02)00026-2
N. Ye, S.M. Emran, Q. Chen, S. Vilbert, Multivariate statistical analysis of audit trails for host-based intrusion detection IEEE Transactions on Computers. ,vol. 51, pp. 810- 820 ,(2002) , 10.1109/TC.2002.1017701
Tichun Wang, Yuzhu Xie, Hao Yan, Research of Multi Sensor Information Fusion Technology Based on Extension Neural Network Mathematical Modelling of Engineering Problems. ,vol. 3, pp. 129- 134 ,(2016) , 10.18280/MMEP.030303
Neha Acharya, Shailendra Singh, None, An IWD-based feature selection method for intrusion detection system soft computing. ,vol. 22, pp. 4407- 4416 ,(2018) , 10.1007/S00500-017-2635-2
Neeraj Kumar, Upendra Kumar, Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques soft computing and pattern recognition. pp. 262- 269 ,(2016) , 10.1007/978-3-319-60618-7_26
Huan Wang, Zhanfang Chen, Xin Feng, Xiaoqiang Di, Dan Liu, Jianping Zhao, Xin Sui, Research on Network Security Situation Assessment and Quantification Method Based on Analytic Hierarchy Process Wireless Personal Communications. ,vol. 102, pp. 1401- 1420 ,(2018) , 10.1007/S11277-017-5202-3
Hao Wu, Zhonghua Wang, Multi-source fusion-based security detection method for heterogeneous networks Computers & Security. ,vol. 74, pp. 55- 70 ,(2018) , 10.1016/J.COSE.2018.01.003