This HTML5 document contains 47 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n20http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n18http://localhost/temp/predkladatel/
n13http://purl.org/net/nknouf/ns/bibtex#
n22http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n6http://linked.opendata.cz/resource/domain/vavai/projekt/
n16http://linked.opendata.cz/ontology/domain/vavai/
n19https://schema.org/
n11http://linked.opendata.cz/resource/domain/vavai/zamer/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n15http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216224%3A14610%2F07%3A00041656%21RIV11-MSM-14610___/
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n7http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n8http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n14http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n9http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n17http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n12http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n10http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216224%3A14610%2F07%3A00041656%21RIV11-MSM-14610___
rdf:type
skos:Concept n16:Vysledek
dcterms:description
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection, and combines them by means of extended trust model. Deployment of trust model ensures interoperability between methods, allows cross-correlation of results during various stages of the detection and ensures efficient evaluation of current traffic in the context of historical observations. The goal of the system, which is designed for online monitoring of high-speed network, is to provide efficient tool for targeted runtime surveillance of malicious traffic by network operators. We aim to achieve this objective by filtering out the non-malicious (trusted) part of the traffic and submitting only potentially malicious flows for subsequent semi-automatic inspection. We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection, and combines them by means of extended trust model. Deployment of trust model ensures interoperability between methods, allows cross-correlation of results during various stages of the detection and ensures efficient evaluation of current traffic in the context of historical observations. The goal of the system, which is designed for online monitoring of high-speed network, is to provide efficient tool for targeted runtime surveillance of malicious traffic by network operators. We aim to achieve this objective by filtering out the non-malicious (trusted) part of the traffic and submitting only potentially malicious flows for subsequent semi-automatic inspection.
dcterms:title
Network Intrusion Detection by Means of Community of Trusting Agents Network Intrusion Detection by Means of Community of Trusting Agents
skos:prefLabel
Network Intrusion Detection by Means of Community of Trusting Agents Network Intrusion Detection by Means of Community of Trusting Agents
skos:notation
RIV/00216224:14610/07:00041656!RIV11-MSM-14610___
n3:aktivita
n9:V n9:Z n9:P
n3:aktivity
P(1M0567), V, Z(MSM6840770038)
n3:dodaniDat
n10:2011
n3:domaciTvurceVysledku
n22:6606288
n3:druhVysledku
n17:D
n3:duvernostUdaju
n8:S
n3:entitaPredkladatele
n15:predkladatel
n3:idSjednocenehoVysledku
436963
n3:idVysledku
RIV/00216224:14610/07:00041656
n3:jazykVysledku
n14:eng
n3:klicovaSlova
network intrusion detection; agent community; trust model
n3:klicoveSlovo
n7:agent%20community n7:trust%20model n7:network%20intrusion%20detection
n3:kontrolniKodProRIV
[6A98BD54AAAF]
n3:mistoKonaniAkce
Los Alamitos, California
n3:mistoVydani
Los Alamitos, California
n3:nazevZdroje
Intelligent Agent Technology
n3:obor
n12:IN
n3:pocetDomacichTvurcuVysledku
1
n3:pocetTvurcuVysledku
5
n3:projekt
n6:1M0567
n3:rokUplatneniVysledku
n10:2007
n3:tvurceVysledku
Pěchouček, Michal Čeleda, Pavel Bartoš, Karel Grill, Martin Rehák, Martin
n3:typAkce
n20:WRD
n3:wos
000252477900087
n3:zahajeniAkce
2007-01-01+01:00
n3:zamer
n11:MSM6840770038
s:numberOfPages
7
n13:hasPublisher
IEEE Computer Society
n19:isbn
978-0-7695-3027-7
n18:organizacniJednotka
14610