{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,23]],"date-time":"2024-04-23T20:51:49Z","timestamp":1713905509425},"reference-count":16,"publisher":"World Scientific Pub Co Pte Lt","issue":"02","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Info. Tech. Dec. Mak."],"published-print":{"date-parts":[[2004,6]]},"abstract":" This paper describes the use of artificial intelligence techniques in the creation of a network-based decision engine for decision support in an Intelligent Intrusion Detection System (IIDS). In order to assess overall network health, the decision engine fuses outputs from different intrusion detection sensors serving as \"experts\" and then analyzes the integrated information to present an overall security view of the system for the security administrator. This paper reports on the workings of a decision engine that has been successfully embedded into the IIDS architecture being built at the Center for Computer Security Research, Mississippi State University. The decision engine uses Fuzzy Cognitive Maps (FCM)s and fuzzy rule-bases for causal knowledge acquisition and to support the causal knowledge reasoning process. <\/jats:p>","DOI":"10.1142\/s0219622004001057","type":"journal-article","created":{"date-parts":[[2004,5,26]],"date-time":"2004-05-26T07:22:29Z","timestamp":1085556149000},"page":"281-306","source":"Crossref","is-referenced-by-count":9,"title":["DECISION MAKING FOR NETWORK HEALTH ASSESSMENT IN AN INTELLIGENT INTRUSION DETECTION SYSTEM ARCHITECTURE"],"prefix":"10.1142","volume":"03","author":[{"given":"AMBAREEN","family":"SIRAJ","sequence":"first","affiliation":[{"name":"Department of Computer Science & Engineering, Butler Hall, Room 300, Corner of Barr and Perry, Mississippi State University, Mississippi State, MS 39762, USA"}]},{"given":"RAYFORD B.","family":"VAUGHN","sequence":"additional","affiliation":[{"name":"Department of Computer Science & Engineering, Butler Hall, Room 300, Corner of Barr and Perry, Mississippi State University, Mississippi State, MS 39762, USA"}]},{"given":"SUSAN M.","family":"BRIDGES","sequence":"additional","affiliation":[{"name":"Department of Computer Science & Engineering, Butler Hall, Room 300, Corner of Barr and Perry, Mississippi State University, Mississippi State, MS 39762, USA"}]}],"member":"219","published-online":{"date-parts":[[2011,11,20]]},"reference":[{"key":"rf1","volume-title":"Structure of Decision: The Cognitive Maps of Political Elites","author":"Axelrod R.","year":"1976"},{"key":"rf4","author":"Brubaker D.","journal-title":"EDN Access"},{"key":"rf5","first-page":"49","volume":"6","author":"Caudill M.","journal-title":"AI Expert"},{"key":"rf6","volume-title":"Seven Methods for Transforming Corporate Data into Business Intelligence","author":"Dhar V.","year":"1997"},{"key":"rf7","volume-title":"Technology for Multimedia","author":"Dickerson J. A.","year":"1996"},{"key":"rf16","volume-title":"Neuro-Fuzzy and Soft Computing","author":"Jang J. S. R.","year":"1997"},{"key":"rf18","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(86)80040-2"},{"key":"rf19","volume-title":"Neural Networks and Fuzzy Systems: A Dynamical Systems Approach to Machine Intelligence","author":"Kosko B.","year":"1992"},{"key":"rf20","volume-title":"Fuzzy Thinking: The New Science of Fuzzy Logic","author":"Kosko B.","year":"1993"},{"key":"rf21","volume-title":"Fuzzy Engineering","author":"Kosko B.","year":"1997"},{"key":"rf26","doi-asserted-by":"publisher","DOI":"10.1002\/1098-111X(200008)15:8<687::AID-INT1>3.0.CO;2-X"},{"key":"rf30","volume-title":"Security in Computing","author":"Pfleeger C. P.","year":"1996"},{"key":"rf32","first-page":"69","author":"Smith E.","journal-title":"IEEE Intelligent Systems and their Applications"},{"key":"rf33","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008165916707"},{"key":"rf35","doi-asserted-by":"publisher","DOI":"10.1016\/0957-4174(91)90136-3"},{"key":"rf38","volume-title":"Fuzzy Logic: Intelligence, Control and Information","author":"Yen J.","year":"1999"}],"container-title":["International Journal of Information Technology & Decision Making"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219622004001057","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T19:09:38Z","timestamp":1565118578000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0219622004001057"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,6]]},"references-count":16,"journal-issue":{"issue":"02","published-online":{"date-parts":[[2011,11,20]]},"published-print":{"date-parts":[[2004,6]]}},"alternative-id":["10.1142\/S0219622004001057"],"URL":"https:\/\/doi.org\/10.1142\/s0219622004001057","relation":{},"ISSN":["0219-6220","1793-6845"],"issn-type":[{"value":"0219-6220","type":"print"},{"value":"1793-6845","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,6]]}}}