Proceedings of the 43rd Annual Southeast Regional Conference - Volume 2 2005
DOI: 10.1145/1167253.1167289
|View full text |Cite
|
Sign up to set email alerts
|

Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
38
0

Year Published

2007
2007
2014
2014

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 48 publications
(38 citation statements)
references
References 11 publications
0
38
0
Order By: Relevance
“…The major challenge for applying D-S theory to IDS is to determine the beliefs of whether an event is malicious or not, from the collected network measurements [4]. There exist multiple ways of assigning probabilities to each of the hypotheses in D-S theory, ranging from data mining techniques to empirical/manual approaches.…”
mentioning
confidence: 99%
“…The major challenge for applying D-S theory to IDS is to determine the beliefs of whether an event is malicious or not, from the collected network measurements [4]. There exist multiple ways of assigning probabilities to each of the hypotheses in D-S theory, ranging from data mining techniques to empirical/manual approaches.…”
mentioning
confidence: 99%
“…The methodology employed by [8] uses data mining techniques to proceed with the BPA tasks. The use of data mining techniques mostly focuses on processing large amounts of audit data traffic rather than performing real-time detection.…”
Section: Related Workmentioning
confidence: 99%
“…This is to find an automatic and selfadaptive process of Basic Probability Assignment (BPA), based on the measured characteristics of the network. The major challenge for applying D-S theory in IDS is to automatically determine the beliefs from the network measurements [8].…”
mentioning
confidence: 99%
“…There have been past attempts [34,36] at achieving this. Bayesian analysis [14] has been the standard and there have been some approaches using alternative theories such as Dempster-Shafer theory [23].…”
Section: Quantifying Uncertaintymentioning
confidence: 99%
“…Dempster-Shafer theory has unique advantages in handling uncertainty in intrusion analysis, namely, the ability to deal with the lack of prior probabilities for all (singleton) events and the ability to combine beliefs from multiple sources of evidence [6,7,34]. In this paper we present an extended Dempster-Shafer model that addresses the fundamental issues in applying DS in intrusion analysis, as mentioned in 1.1.…”
Section: Our Contributionsmentioning
confidence: 99%