On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study
dc.contributor.author | Joshi, Anupam | |
dc.contributor.author | Undercoffer, Jeffrey | |
dc.date.accessioned | 2018-12-18T19:30:44Z | |
dc.date.available | 2018-12-18T19:30:44Z | |
dc.date.issued | 2003-05-01 | |
dc.description | Proceedings of the NSF Workshop on Next Generation Data Mining | en_US |
dc.description.abstract | We examine the intersection of data mining and semantic web in this paper. We briefly identify some points where they can impact one another, and then develop a specific example of intrusion detection, an application of distributed data mining. We have produced an ontology specifying a model of computer attacks. Our model is based upon an analysis of over 4,000 classes of computer attacks and their corresponding attack strategies using data derived from CERT/CC advisories and NIST’s ICAT meta-base. We present our attack model first as a taxonomy and convert it to a target-centric ontology that will be refined and expanded over time. We state the benefits of forgoing dependence upon taxonomies for the classification of computer attacks and intrusions, in favor of ontologies. We illustrate the benefits of utilizing an ontology by comparing a use case scenario of our ontology and the IETF’s Intrusion Detection Exchange Message Format Data Model. | en_US |
dc.description.uri | https://ebiquity.umbc.edu/paper/html/id/68/On-Web-Semantics-and-Data-Mining-Intrusion-Detection-as-a-Case-Study | en_US |
dc.format.extent | 7 pages | en_US |
dc.genre | conference papers and proceedings | en_US |
dc.identifier | doi:10.13016/M2PR7MZ41 | |
dc.identifier.uri | http://hdl.handle.net/11603/12306 | |
dc.language.iso | en_US | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department Collection | |
dc.relation.ispartof | UMBC Faculty Collection | |
dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
dc.rights | Public Domain Mark 1.0 | * |
dc.rights | This is a work of the United States Government. In accordance with 17 U.S.C. 105, no copyright protection is available for such works under U.S. Law. | |
dc.rights.uri | http://creativecommons.org/publicdomain/mark/1.0/ | * |
dc.subject | intrusion detection | en_US |
dc.subject | security | en_US |
dc.subject | semantic web | en_US |
dc.subject | UMBC Ebiquity Research Group | en_US |
dc.title | On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study | en_US |
dc.type | Text | en_US |