A cooperative intrusion detection model based on granular computing

We firstly analyze the method for four attack types, including Probing, DoS (Denial of Service), R2L (Remote to Local) and U2R (User to Root). Based on resource addresses and destination addresses of the network packages, attacks can be divided into four cases, which are respectively one host-one host, one host-many hosts, many hosts-one host and many hosts-many hosts. Specifically, the granular computing method is applied in intrusion detection. A cooperative intrusion detection model is proposed based on granular computing. The construction for an intrusion detection agent is presented.

[1]  MengChu Zhou,et al.  M-M Role-Transfer Problems and Their Solutions , 2009, IEEE Trans. Syst. Man Cybern. Part A.

[2]  Bo Zhang,et al.  The Quotient Space Theory of Problem Solving , 2003, Fundam. Informaticae.

[3]  Yiyu Yao,et al.  Granular computing: Past, present and future , 2008, 2008 IEEE International Conference on Granular Computing.

[4]  Jeffrey Posluns,et al.  Snort 2.0 Intrusion Detection , 2003 .

[5]  Hu Jun An overview of granular computing , 2007 .

[6]  Fan Shi-dong The Calculation of Knowledge Granulation and Its Application , 2002 .

[7]  Yao,et al.  Three Perspectives of Granular Computing , 2006 .

[8]  Vladimir Eidelman,et al.  Cognitive Robotics and Multiagency in a Fuzzy Modeling Framework , 2009, Int. J. Agent Technol. Syst..

[9]  Ana L. C. Bazzan,et al.  Multi-Agent Systems for Traffic and Transportation Engineering , 2009 .

[10]  Jaideep Chandrashekar,et al.  When Gossip is Good: Distributed Probabilistic Inference for Detection of Slow Network Intrusions , 2006, AAAI.

[11]  Yanqing Zhang,et al.  Constructive granular systems with universal approximation and fast knowledge discovery , 2005, IEEE Transactions on Fuzzy Systems.

[12]  Kenneth Mark Bryden,et al.  Initial Formulation of an Optimization Method Based on Stigmergic Construction , 2011, Int. J. Agent Technol. Syst..

[13]  Liu Qing Granules and Applications of Granular Computing in Logical Reasoning , 2004 .

[14]  Huang,et al.  A Granular Computing Model Based on Tolerance relation , 2005 .

[15]  Yiyu Yao,et al.  A Partition Model of Granular Computing , 2004, Trans. Rough Sets.

[16]  Christopher Leckie,et al.  Decentralized multi-dimensional alert correlation for collaborative intrusion detection , 2009, J. Netw. Comput. Appl..

[17]  Eugene H. Spafford,et al.  Intrusion detection using autonomous agents , 2000, Comput. Networks.

[18]  Muaz A. Niazi,et al.  A Novel Formal Agent-Based Simulation Modeling Framework of an AIDS Complex Adaptive System , 2017, Int. J. Agent Technol. Syst..

[19]  Naiqi Wu,et al.  Cooperative Intrusion Detection Model Based on State Transition Analysis , 2007, CSCWD.

[20]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[21]  Christopher Leckie,et al.  A survey of coordinated attacks and collaborative intrusion detection , 2010, Comput. Secur..

[22]  Steven Linscott,et al.  Maximum Security , 1994 .

[23]  Andrzej Bargiela,et al.  The roots of granular computing , 2006, 2006 IEEE International Conference on Granular Computing.

[24]  Bu Dong Principle of Granularity in Clustering and Classification , 2002 .

[25]  Yiyu Yao,et al.  Granular Computing: Past, Present, and Future , 2008, Rough Sets and Knowledge Technology.

[26]  Eugene H. Spafford,et al.  An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[27]  Miao Duoqian,et al.  Application of Granular Computing to Artificial Neural Network , 2006 .

[28]  Han Xie Anomaly intrusion detection based on quotient space granularity clustering , 2010 .

[29]  Andrzej Skowron,et al.  Information granules: Towards foundations of granular computing , 2001 .

[30]  MengChu Zhou,et al.  Efficient Role Transfer Based on Kuhn–Munkres Algorithm , 2012, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[31]  Wu Yu Granular Computing in Incomplete Information Systems , 2005 .

[32]  Ronald R. Yager,et al.  Some learning paradigms for granular computing , 2006, 2006 IEEE International Conference on Granular Computing.

[33]  Liu Qing G-Logic and Its Resolution Reasoning , 2004 .

[34]  Hongle Du,et al.  A Cooperative Network Intrusion detection Based on Fuzzy SVMs , 2010, J. Networks.

[35]  MengChu Zhou,et al.  Role Transfer Problems and their Solutions , 2022 .

[36]  MengChu Zhou,et al.  Role-based collaboration and its kernel mechanisms , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[37]  K. N. King 2006 IEEE International Conference on Granular Computing , 2006, IEEE Comput. Intell. Mag..

[38]  Yiyu Yao,et al.  Granular computing for data mining , 2006, SPIE Defense + Commercial Sensing.

[39]  Abraham Kandel,et al.  Granular neural networks for numerical-linguistic data fusion and knowledge discovery , 2000, IEEE Trans. Neural Networks Learn. Syst..