A translation approach to portable ontology specifications
Knowledge Acquisition - Special issue: Current issues in knowledge modeling
State Transition Analysis: A Rule-Based Intrusion Detection Approach
IEEE Transactions on Software Engineering
SafeBots: a paradigm for software security controls
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Mining in a data-flow environment: experience in network intrusion detection
KDD '99 Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining
Adaptive Intrusion Detection: A Data Mining Approach
Artificial Intelligence Review - Issues on the application of data mining
Ontology in information security: a useful theoretical foundation and methodological tool
Proceedings of the 2001 workshop on New security paradigms
DAMLJessKB: A Tool for Reasoning with the Semantic Web
IEEE Intelligent Systems
Generating realistic workloads for network intrusion detection systems
WOSP '04 Proceedings of the 4th international workshop on Software and performance
Foreword: ontologies for distributed systems
The Knowledge Engineering Review
Efficient Intrusion Detection using Automaton Inlining
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Agent-Based Network Intrusion Detection System Using Data Mining Approaches
ICITA '05 Proceedings of the Third International Conference on Information Technology and Applications (ICITA'05) Volume 2 - Volume 02
Bro: a system for detecting network intruders in real-time
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Expert Systems with Applications: An International Journal
MEPIDS: multi-expression programming for intrusion detection system
IWINAC'05 Proceedings of the First international work-conference on the Interplay Between Natural and Artificial Computation conference on Artificial Intelligence and Knowledge Engineering Applications: a bioinspired approach - Volume Part II
OWL-L: An OWL-based language for Web resources links
Computer Standards & Interfaces
A regular expression matching engine with hybrid memories
Computer Standards & Interfaces
Hi-index | 0.00 |
A new approach is suggested for designing and developing an intrusion detection application where the domain expertise is used for generating it more easily. This approach uses ontologies as a way of grasping the knowledge of a domain, expressing the intrusion detection system much more in terms of the end users domain, generating the intrusion detection more easily and performing intelligent reasoning. Furthermore, ontologies are also used as a conceptual modeling tool allowing a non-expert person to model his/her intrusion detection application only using the concepts of intrusion detection more intuitively and more user-oriented towards his/her domain expertise.