Applying Non-Nested Generalized Exemplars Classification for Cyber-Power Event and Intrusion Detection
نویسندگان
چکیده
منابع مشابه
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of legal behavior (anomaly-based IDSs). Anomaly-based approaches have the advantage of being able to detect previously unknown attacks, but they suffer from the difficulty of building robust models of acceptable behavior whic...
متن کاملAn Implementation and Experiment with the Nested Generalized Exemplars Algorithm
This NRL NCARAI technical note (AIC-95-003) describes work with Salzberg's (1991) NGE. I recently implemented this algorithm and have run a few case studies. The purpose of this note is to publicize this implementation and note a curious result while using it. This implementation of NGE is available at under my WWW address (see above) indexed under software.
متن کاملDistributed Intrusion Detection and Attack Containment for Organizational Cyber Security
The sheer number and sophistication of cyber attacks are making our nation’s critical computer networks increasingly vulnerable. At the same time, these networks are being called upon to play a key role in processing, data storage, monitoring and control of critical infrastructures such as energy, transportation, and finance. Disruption of these networks can have highly damaging affects on our ...
متن کاملA Specification-based Intrusion Detection Framework for Cyber-physical Environment in Electric Power System
The emergence of high-speed networks in electric power systems creates a tight interaction of cyber infrastructure with the physical infrastructure and makes the power system susceptible to cyber penetration and attacks. To address this problem, this paper proposes an innovative approach to develop a specification-based intrusion detection framework that leverages available information provided...
متن کاملDecentralized Event Correlation for Intrusion Detection
Evidence of attacks against a network and its resources is of ten scattered over several hosts. Intrusion detection systems (IDS) which attempt to detect such attacks therefore have to collect and correlate in formation from different sources. We propose a completely decentralized approach to solve the task of event correlation and information fusing of data gathered from multiple points within...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Smart Grid
سال: 2018
ISSN: 1949-3053,1949-3061
DOI: 10.1109/tsg.2016.2642787