Skip Nav Destination
ASME Press Select Proceedings
International Conference on Information Technology and Computer Science, 3rd (ITCS 2011)
Editor
V. E. Muhin ,
V. E. Muhin
National Technical University of Ukraine
Search for other works by this author on:
ISBN:
9780791859742
No. of Pages:
656
Publisher:
ASME Press
Publication date:
2011
eBook Chapter
45 Conditional Random Fields Based Real-Time Intrusion Detection Framework
By
Jiaojiao Gu
,
Jiaojiao Gu
Naval Aeronautical and Astronautical University
Search for other works by this author on:
Wenzhi Jiang
,
Wenzhi Jiang
Naval Aeronautical and Astronautical University
Search for other works by this author on:
Wenxuan Hu
,
Wenxuan Hu
Naval Aeronautical and Astronautical University
Search for other works by this author on:
Xiaoyu Zhang
Xiaoyu Zhang
Naval Aeronautical and Astronautical University
Search for other works by this author on:
Page Count:
4
-
Published:2011
Citation
Gu, J, Jiang, W, Hu, W, & Zhang, X. "Conditional Random Fields Based Real-Time Intrusion Detection Framework." International Conference on Information Technology and Computer Science, 3rd (ITCS 2011). Ed. Muhin, VE, & Hu, WB. ASME Press, 2011.
Download citation file:
Intrusion detection systems are now an essential component in the all kinds of network even including wireless ad hoc network. With the rapid advancement in the network technologies the focus of intrusion detection has shifted from simple signature matching approaches to detecting attacks based on analyzing contextual information that employed in anomaly and hybrid intrusion detection approaches. This paper proposed a layered anomaly intrusion detection framework using Conditional Random Fields to detect a wide variety of attacks. With this framework attacks can be identified and intrusion response can be initiated in real time. Experiments show that the CRF model can...
Topics:
Intrusion prevention systems
Abstract
Keywords
Introduction
Related Work
Conditional Random Fields
The Framework
Experimets
Conclusion and Future Work
References
This content is only available via PDF.
You do not currently have access to this chapter.
Email alerts
Related Chapters
Application of Fuzzy Clustering Algorithm in Intrusion Detection System
International Symposium on Information Engineering and Electronic Commerce, 3rd (IEEC 2011)
Design and Implementation of an Anomaly-Based Intrusion Detection System for Wireless Industrial Networks
International Conference on Advanced Computer Theory and Engineering, 5th (ICACTE 2012)
Host Based Intrusion Detection System
International Conference on Mechanical Engineering and Technology (ICMET-London 2011)
BitPredator: A Discovery Algorithm for BitTorrent Initial Seeders and Peers
International Conference on Advanced Computer Theory and Engineering, 4th (ICACTE 2011)
Related Articles
Creative Contributions of the Methods of Inventive Principles of TRIZ and BioTRIZ to Problem Solving
J. Mech. Des (August,2017)
Intrusion Detection System for Cyber-Manufacturing System
J. Manuf. Sci. Eng (March,2019)
Alert Correlation for Detecting Cyber-Manufacturing Attacks and Intrusions
J. Comput. Inf. Sci. Eng (February,2020)