Information Technology Reference
In-Depth Information
dealing with three classes of attacks, DoS , Probe and U2R , and operating with input
traffic. Architecture of the prototype and some experimental results are outlined.
The intended directions for future research will concern enrichment of the devel-
oped structure of interacting classifiers by the learning capabilities.
Acknowledgement
This research is supported by grant #1993P of European Office of Aerospace R&D
and Russian Foundation for Basic Research (grant 04-01-00494a).
References
1. Bass, T.: Intrusion Detection and Multisensor Information Fusion: Creating Cyberspace
Situational Awareness. Communication of the ACM, Vol. 43(4) (2000) 99-105
2. http://www.ll.mit.edu/IST/ideval/data/1998/1998_data_index.html
3. Cuppens, F., Miege, A.: Alert correlation in a cooperative intrusion detection framework.
IEEE Symposium on Research in Security and Privacy (2002)
4. Debar, H., Wespi, A.: Aggregation and Correlation of Intrusion-Detection Alerts. RAID
2001, LNCS 2212 (2001) 85-103
5. Gorodetsky, V., Karsaev, O., Samoilov, V.: On-Line Update of Situation Assessment: Ge-
neric Approach. International Journal of Knowledge-Based & Intelligent Engineering Sys-
tems. IOS Press, Netherlands, 2005 (Accepted for publication)
6. Gorodetsky, V., Karsaev, O. Samoilov, V.: Direct Mining of Rules from Data with Miss-
ing Values. Studies in Computational Intelligence, T.Y.Lin, S.Ohsuga, C.J. Liau, X.T.Hu,
S.Tsumoto (Eds.). Foundation of Data Mining and Knowledge Discovery, Springer (2005)
233-264
7. Gorodetsky, V., Karsaev, O., Samoilov, V., Konushy, V., Mankov, E., Malyshev, A.:
Multi-Agent System Development Kit. R.Unland, M.Klusch, M.Calisti (Editors). "Multi-
Agent Technology and Software Tools", Whitestein Publishers. Accepted for publication
(2005)
8. Gorodetsky, V., Karsaev, O. Samoilov, V.: On-Line Update of Situation Assessment
Based on Asynchronous Data Streams. 8th International Conference on Knowledge-Based
Intelligent Information & Engineering Systems, LNAI, Vol. 3213, Springer (2004) 1136-
1142
9. Gorodetski, V., Skormin, V., Popyack, L.: Data Mining Technology for Failure Prognos-
tics of Avionics, IEEE Transactions on Aerospace and Electronic Systems. Volume 38, # 2
(2002) 388-403
10. Lazarevic, A., Ertoz, L., Kumar, V., Ozgur, A., Srivastava, J.: A Comparative Study of
Anomaly Detection Schemes in Network Intrusion Detection. 3rd SIA Conference on Data
Mining, San Francisco, CA (2003)
11. Morin, B., Debar, H.: Correlation of Intrusion Symptoms: An Application of Chronicles.
RAID 2003, LNCS 2820, Springer-Verlag (2003) 94-112
12. Pietraszek, T.: Using Adaptive Alert Classification to Reduce False Positives in Intrusion
Detection, RAID 04, LNCS volume 3224 (2004) 102-124
13. Song, T., Ko, K., Alves-Foss, J., Zhang, C., and Levitt, K.: Formal Reasoning About Intru-
sion Detection Systems, RAID 04, LNCS volume 3224 (2004) 278-295
14. 14 Valdes, A., Skinner, S.: Probabilistic Alert Correlation. W. Lee, L. Me, and A. Wespi
(Eds.): RAID 2001, LNCS 2212, Springer-Verlag (2001) 54-68
15. Wooldridge, M., Jennings, N.R., Kinny, D.: The Gaia Methodology for Agent-Oriented
Analysis and Design. Journal of Autonomous Agents and Multi-Agent Systems, Vol. 3.
No. 3 (2000) 285-312
 
Search WWH ::




Custom Search