Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 0976-4143
Online ISSN:
0976-4151


  About JISR
  DLINE Portal Home
Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Sample Issue
Upcoming Conferences
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Subscription
Contact us
 
  How To Order
  Order Online
Price Information
Request for Complimentary
Print Copy
 
  For Authors
  Guidelines for Contributors
Online Submission
Call for Papers
Author Rights
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
International Journal of Computational Linguistics Research (IJCL)
International Journal of Web Application (IJWA)

 

 
Journal of Information Security Research

Analysis of Computer Security Forensics Based on Bayesian Network Intrusion Detection
Xiao Lijun
School of Information Technology and Media Hexi University, Zhangye, Gansu, 734000, China
Abstract: With the rapid development of the Internet, network attacks and intrusion behaviors are becoming increasingly serious, and computer security issues have attracted much attention. In order to effectively respond to network attacks, researchers in the field of computer security have proposed various intrusion detection technologies. This article studies the application of intrusion detection technology based on Bayesian networks in computer security forensics analysis. By constructing a Bayesian network model, analyzing and inferring data such as network traffic and system logs, the detection and forensics of network intrusion behavior have been achieved. This method has the advantages of efficiency, accuracy, and adaptability, and can provide important technical support for the field of computer security.
Keywords: Weighted Naive Bayes Method, Intrusion Detection, Computer Forensics Technology, Integrated Weighting Analysis of Computer Security Forensics Based on Bayesian Network Intrusion Detection
DOI:https://doi.org/10.6025/jisr/2023/14/4/87-95
Full_Text   PDF 652 KB   Download:   52  times
References:

[1] Santos, I., Brezo, F., Ugarte-Pedrero, X., et al. (2013). Opcode sequences as representation of executables for data-mining-based unknown malware detection. Information Sciences, 231, 64-82.

[2] Sindhu, S. S. S., Geetha, S., Kannan, A. (2012). Decision tree based light weight intrusion detection using a wrapper approach. Expert Systems with Applications, 39(1), 129-141.

[3] Davis, J. J., Clark, A. J. (2011). Data preprocessing for anomaly based network intrusion detection: A review. Computers & Security, 30(6), 353-375.

[4] Panda, M., Patra, M. R. (2009). A novel classification via clustering method for anomaly based network intrusion detection system. International Journal of Recent Trends in Engineering, 2(1), 1-6.

[5] Rehman, A., Saba, T. (2014). Evaluation of artificial intelligent techniques to secure information in enterprises. Artificial Intelligence Review, 42(4), 1029-1044.

[6] Ganapathy, S., Kulothungan, K., Muthurajkumar, S., et al. (2013). Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP Journal on Wireless Communications and Networking, 2013(1), 271.

[7] Linghu, H. Y., Chen, M., Wang, H. H., et al. (2009). Bayesian network intrusion detection method based on credibility of mutual information. Computer Engineering and Design, 14, 011.


Home | Aim & Scope | Editorial Board | Author Guidelines | Publisher | Subscription | Previous Issue | Contact Us |Upcoming Conferences|Sample Issues|Library Recommendation Form|

 

Copyright © 2011 dline.info