Intrusion detection system evaluation model based on model checking
Authors
Pengtao Xu, Weijun Zhu
Corresponding Author
Pengtao Xu
Available Online April 2016.
- DOI
- 10.2991/ameii-16.2016.142How to use a DOI?
- Keywords
- Model Checking, Intrusion Detection, Check Data Set, Temporal Logic
- Abstract
At present,with the increase of network bandwidth and network data volume, pattern matching to detect intrusion detection systems have many problems to solve. Then, the method based on the model checking method was proposed, and applied to the intrusion detection system[1][2][3][4].However, the Intrusion detection algorithm based on model checking can not meet about comprehensive performance evaluation. Through the analysis of KDDCUP99 data set, combined with the existing logic formula of attack type based on the behavior of the data set.
- Copyright
- © 2016, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Pengtao Xu AU - Weijun Zhu PY - 2016/04 DA - 2016/04 TI - Intrusion detection system evaluation model based on model checking BT - Proceedings of the 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016) PB - Atlantis Press SP - 723 EP - 727 SN - 2352-5401 UR - https://doi.org/10.2991/ameii-16.2016.142 DO - 10.2991/ameii-16.2016.142 ID - Xu2016/04 ER -