scispace - formally typeset
K

Kjetil Haslum

Researcher at Norwegian University of Science and Technology

Publications -  8
Citations -  285

Kjetil Haslum is an academic researcher from Norwegian University of Science and Technology. The author has contributed to research in topics: Intrusion detection system & Risk management. The author has an hindex of 7, co-authored 8 publications receiving 278 citations.

Papers
More filters
Book ChapterDOI

Real-time risk assessment with network sensors and intrusion detection systems

TL;DR: The system risk is dynamically evaluated using hidden Markov models, providing a mechanism for handling data from sensors with different trustworthiness in terms of false positives and negatives, suitable for risk management and intrusion response applications.
Proceedings ArticleDOI

DIPS: A Framework for Distributed Intrusion Prediction and Prevention Using Hidden Markov Models and Online Fuzzy Risk Assessment

TL;DR: The focus of this paper is on the distributed monitoring of intrusion attempts, the one step ahead prediction of such attempts and online risk assessment using fuzzy inference systems.
Book ChapterDOI

Multisensor Real-time Risk Assessment using Continuous-time Hidden Markov Models

TL;DR: A previously proposed realtime risk assessment method is extended to facilitate more flexible modeling with support for a wide range of sensors and a method for handling continuous-time sensor data and a weighted aggregate of multisensor input is developed.
Proceedings ArticleDOI

Fuzzy Online Risk Assessment for Distributed Intrusion Prediction and Prevention Systems

TL;DR: Fuzzy Logic Controllers are developed to estimate the various risk(s) that are dependent on several other variables based on the inputs from HMM modules and the DIDS agents to develop the fuzzy risk expert system.
Proceedings ArticleDOI

Real-time intrusion prevention and security analysis of networks using HMMs

TL;DR: This paper uses a hidden Markov model (HMM) to model sensors for an intrusion prevention system (IPS) and shows how the model can be applied to an IPS architecture based on intrusion detection system (IDS) sensors, real-time traffic surveillance and online risk assessment.