Status: Past project
Our vision of an intrusion detection system is one where the "system" encompasses the entire enterprise and where intrusion detection is a distributed and collaborative process involving the entities within the enterprise. We view an entity as any computational device to include computers, servers, switches, and routers and where intrusion detectors are comprised of both anomaly and signature detectors that communicate with each other. We have initiated work toward realizing our vision and have achieved positive results by using a two-stage process for host based anomaly detection.
We conduct IDS related research in wired, moble-adhoc, wireless, and sensor network environments.
Start Date: May 2002
End Date: August 2004
There are 12 associated publications: Hide the list...
9 Refereed Publications
1. J. Undercofer et al., "Using DAML+ OIL to classify intrusive behaviours", Article, Knowledge Engineering Review, January 2004, 347 downloads.
2. J. Undercofer et al., "Data Mining, Semantics and Intrusion Detection: What to dig for and Where to find it", InBook, Next Generation Data Mining, December 2003.
3. Sasikanth Avancha et al., "Secure Sensor Networks for Perimeter Protection", Article, Computer Networks, November 2003, 2567 downloads.
4. "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", Article, ACM Monet: Special Issue on Security in Mobile Computing Environments, October 2003, 3478 downloads.
5. J. Undercofer et al., "A Target-Centric Ontology for Intrusion Detection", InProceedings, Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence, July 2003, 774 downloads.
6. John Pinkston, "Hidden Processes: The Implication for Intrusion Detection", InProceedings, Proceedings of the IEEE International Workshop on Information Assurance, May 2003.
7. Anupam Joshi, "On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study", InProceedings, Proceedings of the NSF Workshop on Next Generation Data Mining, May 2003, 2473 downloads.
8. Anupam Joshi et al., "Fuzzy Clustering for Intrusion Detection", InProceedings, Proceedings of the 12th IEEE International Conference on Fuzzy Systems, April 2003.
9. Lalana Kagal et al., "A Security Architecture Based on Trust Management for Pervasive Computing Systems", InProceedings, Grace Hopper Celebration of Women in Computing, October 2002, 4886 downloads.
3 Non-Refereed Publications
1. J. Undercofer et al., "SHOMAR: An Open Architecture for Distributed Intrusion Detection Services", TechReport, University of Maryland, Baltimore County, September 2002, 4819 downloads.
2. Lalana Kagal et al., "Vigil: Providing Trust for Enhanced Security in Pervasive Systems", TechReport, University of Maryland, Baltimore County, August 2002, 4625 downloads.
3. Andrej Cedilnik et al., "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", TechReport, University of Maryland, Baltimore County, August 2001, 3811 downloads.
There are 0 associated resources: Hide the list...