Please use this identifier to cite or link to this item:
https://repository.cihe.edu.hk/jspui/handle/cihe/1425
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chan, Anthony Hing-Hung | en_US |
dc.contributor.other | Barry, B. I. A. | - |
dc.date.accessioned | 2021-08-27T06:23:31Z | - |
dc.date.available | 2021-08-27T06:23:31Z | - |
dc.date.issued | 2007 | - |
dc.identifier.uri | https://repository.cihe.edu.hk/jspui/handle/cihe/1425 | - |
dc.description.abstract | The open nature of the next generation networks (NGNs) and the involvement of multiple protocols in a single session, along with the attacks that spread multiple protocols, pose new challenges to intrusion detection systems (IDSs). Detecting attacks based on information taken from a single protocol or a group of protocols at a certain layer results in a high rate of false positives or false negatives. In this paper, we introduce a new cross protocol design for IDSs in the NGNs based on protocol anomaly detection. Our design aims at correlating various detection results from the protocols involved in a session, both, horizontally and vertically. By horizontal correlation we aim at monitoring sessions taking place within a single layer of the protocol stack, whereas, vertical correlation addresses sessions taking place across multiple protocol layers. In addition, our design is supported by intelligent mechanism based on fuzzy logic to help the system reduce the rate of false alarms which is relatively high in many anomaly based intrusion detection systems. This paper presents the basic features of our design, emphasizing the components and the interactions between them. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.title | Towards intelligent cross protocol intrusion detection in the next generation networks based on protocol anomaly detection | en_US |
dc.type | conference proceedings | en_US |
dc.relation.publication | Proceedings of the 9th International Conference on Advanced Communication Technology (ICACT 2007) | en_US |
dc.identifier.doi | 10.1109/ICACT.2007.358653 | - |
dc.contributor.affiliation | School of Computing and Information Sciences | en_US |
dc.relation.isbn | 9788955191318 | en_US |
dc.description.startpage | 1505 | en_US |
dc.description.endpage | 1510 | en_US |
dc.cihe.affiliated | No | - |
item.languageiso639-1 | en | - |
item.fulltext | No Fulltext | - |
item.openairetype | conference proceedings | - |
item.grantfulltext | none | - |
item.openairecristype | http://purl.org/coar/resource_type/c_5794 | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | Yam Pak Charitable Foundation School of Computing and Information Sciences | - |
crisitem.author.orcid | 0000-0001-7479-0787 | - |
Appears in Collections: | CIS Publication |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.