Skip to main content

On-Line Update of Situation Assessment Based on Asynchronous Data Streams

  • Conference paper
Book cover Knowledge-Based Intelligent Information and Engineering Systems (KES 2004)

Abstract

The subject of the paper is multi-agent architecture of and algorithmic basis for on-line situation assessment update based on asynchronous streams of input data received from multiple sources and having finite “life time”. A case study from computer network security area that is anomaly detection is used for demonstration.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cohen, W.: Fast efficient rule induction. In: Machine Learning: The 12th International Conference, Morgan Kaufmann, San Francisco, CA (1995)

    Google Scholar 

  2. Cole, E.: Hackers Beware. New Riders Publishing (2002)

    Google Scholar 

  3. Gorodetsky, V., Karsaev, O.: Mining of Data with Missing Values: A Lattice-based Approach. In: International Workshop on the Foundation of Data Mining and Discovery, Japan, pp. 151–156 (2002)

    Google Scholar 

  4. Gorodetsky, V., Karsaev, O.: Algorithm of Rule Extraction from Learning Data. In: Proceedings of the 8-th International Conference Expert Systems & Artificial Intelligence (EXPERSYS-1996), pp. 133–138 (1996)

    Google Scholar 

  5. Michalski, R.: A Theory and Methodology of Inductive Learning. In: Carbonel, J.G., Michalski, R.S., Mitchel, T.M. (eds.) Machine Learning, Tigoda, Palo Alto, vol. 1, pp. 83–134 (1983)

    Google Scholar 

  6. Northcut,t, S., McLachlan, D., Novak, J.: Network Intrusion Detection: An Analyst’s Handbook. New Riders Publishing (2000)

    Google Scholar 

  7. Salerno, J., Hinman, M., Boulware, D.: Building a Framework for Situation Assessment. In: 7th International Conference on Information Fusion. Stockholm, Sweden (to appear, 2004)

    Google Scholar 

  8. Scambray, J., McClure, S.: Hacking Exposed Windows 2000: Network Security Secrets. McGraw-Hill, New York (2001)

    Google Scholar 

  9. Scambray, J., McClure, S., Kurtz, G.: Hacking Exposed. McGraw-Hill, New York (2000)

    Google Scholar 

  10. Than, C., Ly, G.S., Venkatesh, S., Pearce, A.: Multiple Hypotheses Situation Assessment. In: Proceedings of The 6th International Conference on Information Fusion, Australia, pp. 972–978 (2004)

    Google Scholar 

  11. Vapnik, V.: Statistical Learning Theory. J.Willey and Sons, New York (1998)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gorodetsky, V., Karsaev, O., Samoilov, V. (2004). On-Line Update of Situation Assessment Based on Asynchronous Data Streams. In: Negoita, M.G., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2004. Lecture Notes in Computer Science(), vol 3213. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30132-5_154

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30132-5_154

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23318-3

  • Online ISBN: 978-3-540-30132-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics