UMBC ebiquity

Intrusion Detection

Status: Past project

Project Description:

Our vision of an intrusion detection system is one where the "system" encompasses the entire enterprise and where intrusion detection is a distributed and collaborative process involving the entities within the enterprise. We view an entity as any computational device to include computers, servers, switches, and routers and where intrusion detectors are comprised of both anomaly and signature detectors that communicate with each other. We have initiated work toward realizing our vision and have achieved positive results by using a two-stage process for host based anomaly detection.

We conduct IDS related research in wired, moble-adhoc, wireless, and sensor network environments.

Start Date: May 2002

End Date: August 2004

Faculty:
John Pinkston

Students:
Jim Parker

Tags: intrusion detection, ontology, semantic web

 

There are 12 associated publications:  Hide the list...

9 Refereed Publications

2004

1. J. Undercofer et al., "Using DAML+ OIL to classify intrusive behaviours", Article, Knowledge Engineering Review, January 2004, 253 downloads.

2003

2. J. Undercofer et al., "Data Mining, Semantics and Intrusion Detection: What to dig for and Where to find it", InBook, Next Generation Data Mining, December 2003.

3. Sasikanth Avancha et al., "Secure Sensor Networks for Perimeter Protection", Article, Computer Networks, November 2003, 2480 downloads.

4. "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", Article, ACM Monet: Special Issue on Security in Mobile Computing Environments, October 2003, 3391 downloads.

5. J. Undercofer et al., "A Target-Centric Ontology for Intrusion Detection", InProceedings, Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence, July 2003, 733 downloads.

6. John Pinkston, "Hidden Processes: The Implication for Intrusion Detection", InProceedings, Proceedings of the IEEE International Workshop on Information Assurance, May 2003.

7. Anupam Joshi, "On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study", InProceedings, Proceedings of the NSF Workshop on Next Generation Data Mining, May 2003, 2417 downloads.

8. Anupam Joshi et al., "Fuzzy Clustering for Intrusion Detection", InProceedings, Proceedings of the 12th IEEE International Conference on Fuzzy Systems, April 2003.

2002

9. Lalana Kagal et al., "A Security Architecture Based on Trust Management for Pervasive Computing Systems", InProceedings, Grace Hopper Celebration of Women in Computing, October 2002, 4839 downloads.

3 Non-Refereed Publications

2002

1. J. Undercofer et al., "SHOMAR: An Open Architecture for Distributed Intrusion Detection Services", TechReport, University of Maryland, Baltimore County, September 2002, 4766 downloads.

2. Lalana Kagal et al., "Vigil: Providing Trust for Enhanced Security in Pervasive Systems", TechReport, University of Maryland, Baltimore County, August 2002, 4585 downloads.

2001

3. Andrej Cedilnik et al., "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", TechReport, University of Maryland, Baltimore County, August 2001, 3772 downloads.

 

There are 0 associated resources:  Hide the list...

 

Research Areas:
 Security, Trust and Privacy