Fuzzy cognitive maps for decision support in an automatic intrusion response mechanism

Cheng Po Mu*, Hou Kuan Huang, Sheng Feng Tian

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Citations (Scopus)

Abstract

One of the key issues in developing an automatic response system is how to determine a response plan and response measures and how to make sure that they are proper when an attack is detected by an IDS. It is hard to find an exact mathematical model to describe this decision-making process because there are a lot of factors in the process and these factors interact each other. Fuzzy Cognitive Maps aim to mimic the reasoning process of the human. FCMs are able to capture and imitate the nature of human being in describing, representing and developing models. They are good at processing fuzzy and rough information and have adaptive, intelligent features. This paper presents a FCM-based decision support mechanism, which synthetically takes all of the related factors into account, offering objective parameters for setting up the intrusion response plan and choosing response measures. The mechanism is robust, adaptive and simple.

Original languageEnglish
Title of host publicationProceedings of 2004 International Conference on Machine Learning and Cybernetics
Pages1789-1794
Number of pages6
Publication statusPublished - 2004
Externally publishedYes
EventProceedings of 2004 International Conference on Machine Learning and Cybernetics - Shanghai, China
Duration: 26 Aug 200429 Aug 2004

Publication series

NameProceedings of 2004 International Conference on Machine Learning and Cybernetics
Volume3

Conference

ConferenceProceedings of 2004 International Conference on Machine Learning and Cybernetics
Country/TerritoryChina
CityShanghai
Period26/08/0429/08/04

Keywords

  • Decision Support
  • Fuzzy Cognitive Map
  • Intrusion Detection
  • Intrusion Response

Fingerprint

Dive into the research topics of 'Fuzzy cognitive maps for decision support in an automatic intrusion response mechanism'. Together they form a unique fingerprint.

Cite this