Title :
A cooperative intrusion detection model based on granular computing
Author :
Wei Zhang ; Shaohua Teng ; Xiufen Fu ; Jihui Fan ; Yi Teng ; Haibin Zhu
Author_Institution :
Sch. of Comput., Guangdong Univ. of Technol., Guangzhou, China
Abstract :
We firstly analyze the method for four attack types, including Probing, DoS (Denial of Service), R2L (Remote to Local) and U2R (User to Root). Based on resource addresses and destination addresses of the network packages, attacks can be divided into four cases, which are respectively one host-one host, one host-many hosts, many hosts-one host and many hosts-many hosts. Specifically, the granular computing method is applied in intrusion detection. A cooperative intrusion detection model is proposed based on granular computing. The construction for an intrusion detection agent is presented.
Keywords :
computer network security; granular computing; DoS attack; R2L attack; U2R attack; cooperative intrusion detection model; denial of service attack; destination addresses; granular computing method; many hosts-many hosts; many hosts-one host; one host-many hosts; one host-one host; probing attack; remote to local attack; resource addresses; user to root attack; Computational modeling; Computer crime; Feature extraction; IP networks; Intrusion detection; Ports (Computers); Sensors; Intrusion detection; cooperative computing; granular computing; scanning attack;
Conference_Titel :
Computer Supported Cooperative Work in Design (CSCWD), 2013 IEEE 17th International Conference on
Conference_Location :
Whistler, BC
Print_ISBN :
978-1-4673-6084-5
DOI :
10.1109/CSCWD.2013.6580983