The research of a cooperative model intrusion detection system

N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The paper introduces a model of the Cooperative System of Honeypots and Intrusion Detection System (CSHIDS). The method of implementing the cooperation is: firstly, the Honeypots and HoneyWall try to record various attackers' behaviors and transfer them to Remote Log Server, secondly, the cooperative system divides the records into several classes by using the way of Unsupervised Clustering; thirdly, make the records labeled; and then extract attack-rules from the labeled records by Decision Tree; at last, add the new attack-rules to the Intrusion Detection System's rule-set in a certain time interval. The purpose is that Intrusion Detection System (IDS) can detect the new attacks. This model's effectiveness has been confirmed by the simulated experiments. © 2012 Springer-Verlag GmbH.

Cite

CITATION STYLE

APA

Zhu, Q., & Shun, Y. (2012). The research of a cooperative model intrusion detection system. In Advances in Intelligent and Soft Computing (Vol. 163 AISC, pp. 507–515). https://doi.org/10.1007/978-3-642-29458-7_75

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free