Proceedings of International Symposium on Sensor Networks, Systems and Security 2018
DOI: 10.1007/978-3-319-75683-7_15
|View full text |Cite
|
Sign up to set email alerts
|

Stochastic Tools for Network Intrusion Detection

Abstract: With the rapid development of Internet and the sharp increase of network crime, network security has become very important and received a lot of attention. We model security issues as stochastic systems. This allows us to find weaknesses in existing security systems and propose new solutions. Exploring the vulnerabilities of existing security tools can prevent cyber-attacks from taking advantages of the system weaknesses. We propose a hybrid network security scheme including intrusion detection systems (IDSs) … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…From defender's perspective, Miehling et al in [10] have adopted POMDP to optimally interfere the attacker's progression; Hu et al in [7] have also modeled the defense problem with POMDP and proposed online algorithm for adaptive defense measure. Yu and Brooks [22] have applied POMDP and its approximation solution as a stochastic tool for network intrusion detection. On the other hand, Sarraute et al [17] in an attacker's view have introduced POMDP in attack planning issue of penetration testing.…”
Section: Introductionmentioning
confidence: 99%
“…From defender's perspective, Miehling et al in [10] have adopted POMDP to optimally interfere the attacker's progression; Hu et al in [7] have also modeled the defense problem with POMDP and proposed online algorithm for adaptive defense measure. Yu and Brooks [22] have applied POMDP and its approximation solution as a stochastic tool for network intrusion detection. On the other hand, Sarraute et al [17] in an attacker's view have introduced POMDP in attack planning issue of penetration testing.…”
Section: Introductionmentioning
confidence: 99%