TY - GEN
T1 - Evidential reasoning in network intrusion detection systems
AU - Esmaili, Mansour
AU - Safavi-Naini, Reihaneh
AU - Pieprzyk, Josef
PY - 1996
Y1 - 1996
N2 - Intrusion Detection Systems (IDS) have previously been built by hand. These systems have difficulty successfully classifying intruders, and require a significant amount of computational overhead making it difficult to create robust real-time IDS systems. Artificial Intelligence techniques can reduce the human effort required to build these systems and can improve their performance. AI has recently been used in Intrusion Detection (ID) for anomaly detection, data reduction and induction, or discovery, of rules explaining audit data [l]. This paper proposes the application of evidential reasoning for dealing with uncertainty in Intrusion Detection Systems. We show how dealing with uncertainty can allow the system to detect the abnormality in the user behavior more efficiently.
AB - Intrusion Detection Systems (IDS) have previously been built by hand. These systems have difficulty successfully classifying intruders, and require a significant amount of computational overhead making it difficult to create robust real-time IDS systems. Artificial Intelligence techniques can reduce the human effort required to build these systems and can improve their performance. AI has recently been used in Intrusion Detection (ID) for anomaly detection, data reduction and induction, or discovery, of rules explaining audit data [l]. This paper proposes the application of evidential reasoning for dealing with uncertainty in Intrusion Detection Systems. We show how dealing with uncertainty can allow the system to detect the abnormality in the user behavior more efficiently.
UR - http://www.scopus.com/inward/record.url?scp=84947997895&partnerID=8YFLogxK
M3 - Conference proceeding contribution
AN - SCOPUS:84947997895
SN - 3540619917
SN - 9783540619918
VL - 1172
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 253
EP - 265
BT - Information Security and Privacy - 1st Australasian Conference, ACISP 1996, Proceedings
PB - Springer, Springer Nature
CY - Berlin; Heidelberg
T2 - 1st Australasian Conference on Information Security and Privacy, ACISP - 1996
Y2 - 24 June 1996 through 26 June 1996
ER -