Extending Signature-based Intrusion Detection Systems WithBayesian Abductive Reasoning.
Ashwinkumar GanesanPooja ParameshwarappaAkshay PeshaveZhiyuan ChenTim OatesPublished in: CoRR (2019)
Keyphrases
- intrusion detection system
- abductive reasoning
- intrusion detection
- network security
- network intrusion detection
- network traffic
- inference rules
- anomaly detection
- computer networks
- nonmonotonic reasoning
- logic programs
- probabilistic logic
- reasoning tasks
- plan recognition
- natural language understanding
- computer systems
- network intrusion detection systems
- distributed intrusion detection
- computer security
- cyber attacks
- logic programming
- misuse detection
- data mining
- probabilistic model
- training set
- bayesian networks
- cyber security
- feature selection
- alert correlation
- attack scenarios
- information retrieval