Skip to main content

An Ontology-Based Network Intrusion Detection System: A User-Oriented Approach

  • Conference paper
Intelligence and Security Informatics (ISI 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3975))

Included in the following conference series:

Abstract

In this paper, a new approach is suggested for designing and developing an intrusion detection application where the domain expertise is used for generating it more easily. This approach uses ontologies as a way of grasping the knowledge of a domain, expressing the intrusion detection system much more in terms of the end users domain, generating the intrusion detection more easily and performing intelligent reasoning. Experimental results show that our anomaly detection techniques are very promising and are successful in automatically detecting intrusions at very low false alarm rate compared with several important traditional classification techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. DAMLJessKB (October 2002), Available at, http://edge.cs.drexel.edu/assemblies/software/damljesskb/

  2. Lee, W.S., Stolfo, J., Mok, K.W.: Data Mining in Work Flow Environments: Experiences in Intrusion Detection. In: Proceedings of the 1999 Conference on Knowledge Discovery and Data mining (KDD 1999), pp. 253–262 (1999)

    Google Scholar 

  3. Reddyl, Y.B., Guha, R.: Intrusion Detection using Data Mining Techniques. In: Artificial Intelligence and Applications (AIA 2004), pp. 232–241 (2004)

    Google Scholar 

  4. Undercoffer, J., Pinkston, J., Joshi, A., Finin, T.A.: Target-Centric Ontology for Intrusion Detection. In: IJCAI Workshop on Ontologies and Distributed Systems, IJCAI 2003 (August 2003)

    Google Scholar 

  5. Kumar, S., Spafford, E.H.: A Software Architecture to Support Misuse Intrusion Detection. In: Proceedings of the 18th National Information Security Conference, pp. 194–204 (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hung, SS., Liu, D.SM. (2006). An Ontology-Based Network Intrusion Detection System: A User-Oriented Approach. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, FY. (eds) Intelligence and Security Informatics. ISI 2006. Lecture Notes in Computer Science, vol 3975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11760146_105

Download citation

  • DOI: https://doi.org/10.1007/11760146_105

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34478-0

  • Online ISBN: 978-3-540-34479-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics