{"title":"入侵检测系统的模糊描述逻辑模型","authors":"Zohreh Baniasadi, A. Sanei, M. Omidi","doi":"10.1109/ISTEL.2010.5734086","DOIUrl":null,"url":null,"abstract":"Today most managing network security systems, especially Intrusion Detection System (IDS), play a significant role in computer societies and due to the evolution of threats, the use of traditional crisp methods are not efficient. It is also clear that high level conceptual modeling eases the complex attack detection process. This paper proposes a new approach in which the benefits of both fuzzy and description logics are exploited in IDS in the form of simple model. Finally our example shows the main aim of attackers by categorizing attacks.","PeriodicalId":306663,"journal":{"name":"2010 5th International Symposium on Telecommunications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A fuzzy description logic model for Intrusion Detection Systems\",\"authors\":\"Zohreh Baniasadi, A. Sanei, M. Omidi\",\"doi\":\"10.1109/ISTEL.2010.5734086\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today most managing network security systems, especially Intrusion Detection System (IDS), play a significant role in computer societies and due to the evolution of threats, the use of traditional crisp methods are not efficient. It is also clear that high level conceptual modeling eases the complex attack detection process. This paper proposes a new approach in which the benefits of both fuzzy and description logics are exploited in IDS in the form of simple model. Finally our example shows the main aim of attackers by categorizing attacks.\",\"PeriodicalId\":306663,\"journal\":{\"name\":\"2010 5th International Symposium on Telecommunications\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 5th International Symposium on Telecommunications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISTEL.2010.5734086\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 5th International Symposium on Telecommunications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISTEL.2010.5734086","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A fuzzy description logic model for Intrusion Detection Systems
Today most managing network security systems, especially Intrusion Detection System (IDS), play a significant role in computer societies and due to the evolution of threats, the use of traditional crisp methods are not efficient. It is also clear that high level conceptual modeling eases the complex attack detection process. This paper proposes a new approach in which the benefits of both fuzzy and description logics are exploited in IDS in the form of simple model. Finally our example shows the main aim of attackers by categorizing attacks.