Analysis of distributed intrusion detection systems using Bayesian methods

  • Burroughs D
  • Wilson L
  • Cybenko G
  • 19

    Readers

    Mendeley users who have this article in their library.
  • N/A

    Citations

    Citations of this article.

Abstract

In computer and network security, standard ap- proaches to intrusion detection and response attempt to detect and prevent individual attacks. However, it is not the attack but rather the attacker against which our networks must be defended. To do this, the in- formation that is being provided by intrusion detec- tion systems (IDS) must be gathered and then divided into its component parts such that the activity of in- dividual attackers is made clear. Our approach to this involves the application of Bayesian methods to data being gathered from distributed IDS. With this we hope to improve the capabilities for early detection of dis- tributed attacks against infrastructure and the detec- tion of the preliminary phases of distributed denial of service attacks.

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Authors

  • D.J. Burroughs

  • L.F. Wilson

  • G.V. Cybenko

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free