Storage-based anomaly intrusion detection Technology based on D-S evidence theory

Jingfeng Xue*, Fengnian Zhao, Xiaolin Zhao, Gang Shu

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

The storage operation of normal process in host system is analyzed and an anomaly intrusion detection method based on D-S evidence theory for storage system is proposed. The detector fuses multiple signatures of storage data to decide whether the storage operation flow is normal. Furthermore, six groups of light-computation signatures of storage operation data are used to develop an efficient fusion mechanism to guarantee high performance of the algorithm. Experiment shows that high detection rate can be achieved by such fusion.

Original languageEnglish
Title of host publicationProceedings of the 2008 International Conference on Computer and Electrical Engineering, ICCEE 2008
Pages507-510
Number of pages4
DOIs
Publication statusPublished - 2008
Event2008 International Conference on Computer and Electrical Engineering, ICCEE 2008 - Phuket, Thailand
Duration: 20 Dec 200822 Dec 2008

Publication series

NameProceedings of the 2008 International Conference on Computer and Electrical Engineering, ICCEE 2008

Conference

Conference2008 International Conference on Computer and Electrical Engineering, ICCEE 2008
Country/TerritoryThailand
CityPhuket
Period20/12/0822/12/08

Fingerprint

Dive into the research topics of 'Storage-based anomaly intrusion detection Technology based on D-S evidence theory'. Together they form a unique fingerprint.

Cite this