2015
DOI: 10.1007/978-3-319-19578-0_31
|View full text |Cite
|
Sign up to set email alerts
|

A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
1
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…IDS is typically capable to identify the diverse cyber threats and attacks, even the unknown zero-day attack, and able to respond in real-time based on the user's requirements. IDS gathers data from different sources in a computer network or device for this purpose and identifies security policy breaches that can be used to detect internal and external attacks [52,53]. IDS can be several types based on environment type and detection approaches.…”
Section: Cybersecurity Defense Strategiesmentioning
confidence: 99%
“…IDS is typically capable to identify the diverse cyber threats and attacks, even the unknown zero-day attack, and able to respond in real-time based on the user's requirements. IDS gathers data from different sources in a computer network or device for this purpose and identifies security policy breaches that can be used to detect internal and external attacks [52,53]. IDS can be several types based on environment type and detection approaches.…”
Section: Cybersecurity Defense Strategiesmentioning
confidence: 99%
“…The traditional well-known security solutions such as firewalls, user authentication, and access control, and data encryption and cryptography systems however might not be effective according to today's need in the cyber industry [16] [17] [18] [19]. On the other hand, IDS resolves the issues by analyzing security data from several key points in a computer network or system [39] [40]. Moreover, intrusion detection systems can be used to detect both internal and external attacks.…”
Section: Cybersecurity Defense Strategiesmentioning
confidence: 99%
“…Thus, the ontology is designed to allow sharing and reuse of knowledge between entities of the same field [27]. RDF-S (Resource Description Framework-Schema) provide a visualization service for ontologies and knowledge representation of any object [24]. The RDF is a model and defined as a set, called Resources, Literals, Properties (subset of Resources), and Statements, where every element is a triplet of the form: subject, predicate, object [27,122].…”
Section: B Ontologymentioning
confidence: 99%
“…Predicate is a member of Properties, subject is a member of Resources, and object is also a member of Resources or Literals [27]. Few approaches and works in the field of intrusion detection are dedicated to the integration of the ontological model with the IDS [24]. In order to improve the accuracy and efficiency of detection and to make intelligent reasoning, the approaches are adapted to the trend of collaborative IDS mixed with an ontological structure [24,145].…”
Section: B Ontologymentioning
confidence: 99%