Detection of Suspicious Activity Using Different Rule Engines -- Comparison of BaseVISor, Jena and Jess Rule Engines

  • Authors:
  • Jakub Moskal;Christopher J. Matheus

  • Affiliations:
  • Dept. of Electrical and Computer Engineering, Northeastern University, Boston, USA;VIStology, Inc., Framingham, USA

  • Venue:
  • RuleML '08 Proceedings of the International Symposium on Rule Representation, Interchange and Reasoning on the Web
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we present our experience working on the problem of detecting suspicious activity using OWL ontologies and inference rules. For this purpose we implemented partial solutions using three different rule engines - BaseVISor, Jena and Jess. Each of them required different levels of effort and each had its strengths and weaknesses. We describe our impressions from working with each engine, focusing on the ease of writing and reading rules, support for RDF-based documents, support for different methods of reasoning and interoperability.