By Topic

Ontology-based distributed intrusion detection system

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Abdoli, F. ; Ferdowsi Univ. of Mashhad, Mashhad, Iran ; Kahani, M.

In this paper we discussed about utilizing methods and techniques of semantic web in the Intrusion Detection Systems. To extract semantic relations between computer attacks and intrusions in a Distributed Intrusion Detection System, we use ontology. Protege software is our selected software for building ontology. In addition, we utilized Jena framework to make interaction between MasterAgent and attacks ontology. Our Distributed Intrusion Detection System is a network which contains some IDSagents and a special MasterAgent. MasterAgent contains our proposed attacks ontology. Every time a IDSagent detects an attack or new suspected condition, it sends detection's report for MasterAgent. Therefore, it can extract the semantic relationship among computer attacks and suspected situations in the network with proposed ontology. Finally, the experience shows that the pruposed system reduced the rate of false positive and false negative.

Published in:

Computer Conference, 2009. CSICC 2009. 14th International CSI

Date of Conference:

20-21 Oct. 2009