Novel intrusion prevention and detection methods

V. Jotsov
{"title":"Novel intrusion prevention and detection methods","authors":"V. Jotsov","doi":"10.1109/IS.2008.4670526","DOIUrl":null,"url":null,"abstract":"Analysis of contemporary information security systems (ISS) and especially the case of intrusion detection systems (IDS) shows us few character negative features and drawbacks. Original methods and combined anomaly and signature IDS applications are presented in the paper. Human-centered methods INCONSISTENCY, FUNNEL, CALEIDOSCOPE and CROSSWORD interact on a competitive principle and are controlled by a synthetic metamethod SMM. A research is going on for the possibilities of including other machine learning and data mining methods under the general control of SMM. Their applications aim at computational discovery and knowledge acquisition. It is reinforced by identification and resolution of contradictions, self-learning and other methods for analysis of different types of models from the ISS domain. The complexity of application results is considered. The data analysis in the field frequently needs an act of creation especially if it is applied in a knowledge-poor environment. It is shown that even in this case the creative processes are based on applications of clear and well-formalized methods.","PeriodicalId":305750,"journal":{"name":"2008 4th International IEEE Conference Intelligent Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 4th International IEEE Conference Intelligent Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IS.2008.4670526","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Analysis of contemporary information security systems (ISS) and especially the case of intrusion detection systems (IDS) shows us few character negative features and drawbacks. Original methods and combined anomaly and signature IDS applications are presented in the paper. Human-centered methods INCONSISTENCY, FUNNEL, CALEIDOSCOPE and CROSSWORD interact on a competitive principle and are controlled by a synthetic metamethod SMM. A research is going on for the possibilities of including other machine learning and data mining methods under the general control of SMM. Their applications aim at computational discovery and knowledge acquisition. It is reinforced by identification and resolution of contradictions, self-learning and other methods for analysis of different types of models from the ISS domain. The complexity of application results is considered. The data analysis in the field frequently needs an act of creation especially if it is applied in a knowledge-poor environment. It is shown that even in this case the creative processes are based on applications of clear and well-formalized methods.
新的入侵防御和检测方法
通过对当代信息安全系统,特别是入侵检测系统的分析,我们发现了一些信息安全系统的缺点和缺点。本文介绍了原始的检测方法,并结合了异常检测和签名检测的应用。不一致性、漏斗、万花筒和纵横字谜以竞争原则相互作用,并由综合元方法SMM控制。将其他机器学习和数据挖掘方法纳入SMM的一般控制下的可能性正在进行研究。它们的应用旨在计算发现和知识获取。通过识别和解决矛盾,自我学习和其他方法来分析来自ISS领域的不同类型的模型,从而加强了它。考虑了应用结果的复杂性。现场的数据分析往往需要创造性的行为,特别是在知识贫乏的环境中应用时。它表明,即使在这种情况下,创造性的过程是基于应用的清晰和良好的形式化的方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信