O'Reilly logo

Emerging Trends in ICT Security by Hamid R Arabnia, Babak Akhgar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 27

Counter Cyber Attacks By Semantic Networks

Peng He,    University of Maryland, Baltimore, MD, USA

In order to increase the accuracy of intrusion detection rate and reduce the false alarm rate for cyber-security analysis, attack correlation has become an indispensable component in most intrusion detection systems. However, traditional intrusion detection techniques often fail to handle the complex and uncertain network attack correlation tasks. We propose the creation of semantic networks that build relationships among network attacks and assist in automatically identifying and predicting related attacks. Also, our method can increase the precision in detecting probable attacks. Experimental results show that our semantic network, using ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required