A Knowledge-Based Approach To Intrusion Detection Modeling
dc.contributor.author | More, Sumit | |
dc.contributor.author | Mathews, M. Lisa | |
dc.contributor.author | Joshi, Anupam | |
dc.contributor.author | Finin, Tim | |
dc.date.accessioned | 2018-11-14T17:17:29Z | |
dc.date.available | 2018-11-14T17:17:29Z | |
dc.date.issued | 2012-05-24 | |
dc.description | Proceedings of the IEEE Workshop on Semantic Computing and Security | en_US |
dc.description.abstract | Current state of the art intrusion detection and prevention systems (IDPS) are signature-based systems that detect threats and vulnerabilities by cross-referencing the threat or vulnerability signatures in their databases. These systems are incapable of taking advantage of heterogeneous data sources for analysis of system activities for threat detection. This work presents a situation-aware intrusion detection model that integrates these heterogeneous data sources and build a semantically rich knowledge-base to detect cyber threats/vulnerabilities. | en_US |
dc.description.sponsorship | This work was partially supported by a gift from Northrop Grumman Corporation and grant from Air Force Office of Scientific Research. | en_US |
dc.description.uri | https://ieeexplore.ieee.org/document/6227687 | en_US |
dc.format.extent | 7 pages | en_US |
dc.genre | conference papers and proceedings preprints | en_US |
dc.identifier | doi:10.13016/M2NC5SH1Z | |
dc.identifier.citation | Sumit More, M. Lisa Mathews, Anupam Joshi, and Tim Finin, A Knowledge-Based Approach To Intrusion Detection Modeling, Proceedings of the IEEE Workshop on Semantic Computing and Security, 2012, DOI: 10.1109/SPW.2012.26 | en_US |
dc.identifier.uri | 10.1109/SPW.2012.26 | |
dc.identifier.uri | http://hdl.handle.net/11603/11976 | |
dc.language.iso | en_US | en_US |
dc.publisher | IEEE | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department Collection | |
dc.relation.ispartof | UMBC Faculty Collection | |
dc.relation.ispartof | UMBC Student Collection | |
dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
dc.rights | © 2012 IEEE | |
dc.subject | security | en_US |
dc.subject | vulnerability | en_US |
dc.subject | intrusion detection | en_US |
dc.subject | information extraction | en_US |
dc.subject | ontology | en_US |
dc.subject | UMBC Ebiquity Research Group | en_US |
dc.title | A Knowledge-Based Approach To Intrusion Detection Modeling | en_US |
dc.type | Text | en_US |