The Evaluation of Capabilities of Intellectual Intrusion Detection Systems for the Use in Web- Based Information Systems

Pjotrs Dorogovs, Andrejs Romanovs

Abstract


Nowadays with vast growing number of network information systems and their integration not only into work but also into people’s private life, security assurance of industrial and private information assets is becoming an extremely sensitive and topical issue. There is a huge number of available non- commercial (free of charge) and commercial methods for information protection from unauthorized access of undesirable individuals. Currently, studies in the field of information security focus on the use of various intellectual data mining techniques for building an intellectual information security system. Such security systems roughly (for the purpose of this paper) can be divided into intrusion protection and intrusion detection systems IPS and IDS, respectively [1].


Keywords:

Information security; intrusion detection; system modelling; Web- based system security

Full Text:

PDF

References


P.Dorogovs, A.Borisovs, A.Romanovs. Building an Intrusion Detection System for IT Security Based on Data Mining Techniques, Scientific Journal of Riga Technical University, Series 5, Computer Science, Vol.40, Information Technology and Management Science, pp.43-48, 2011.

Joseph S. Sherif, Tommy G. Dearmond, Intrusion Detection: Systems and Models, Proc.of the 11th IEEE Intern.Workshop on Enabling Technologies for Collaborative Enterprises, WETICE’02, pp.115-136, 2002.

W.Lee, Salvatore J.Stolfo, A Framework for Constructing Features and Models for Intrusion Detection Systems, ACM Transactions on Information and System Security (TISSEC), Vol.3, Issue 4, pp.227-261, 2000.

Charu C. Aggarwal, Z.Sun, Philip S. Yu, Fast Algorithms for Online Generation of Profile Association Rules, IEEE Transactions On Knowledge And Data Engineering, Vol. 14, No. 5, pp.1017-1028, 2002.

Steven A. Hofmeyr, Stephanie Forrest, and Anil Somayaji. Intrusion detection using sequences of system calls. Journal of Computer Security, 6(3):151–180, 1998.

L. R. Rabiner. A tutorial on Hidden Markov Models and selected applications in speech recognition. Proceedings of the IEEE, 77(2), pp.257–286, 1989.

L. R. Rabiner and B. H. Juang. An Introduction to Hidden Markov Models. IEEE ASSP Magazine, pp. 4–16, January 1986.

K. Aas and L. Eikvil, Text Categorisation: A Survey, http://citeseer.nj.nec.com/aas99text.html, 1999.

Y.H. Liao and V. R. Vemuri, Use of K-nearest Neighbor Classifier for Intrusion Detection. Computer & Security, vol. 21, No 5, pp. 439-448, 2002.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2012 Pjotrs Dorogovs, Andrejs Romanovs

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.