Figure 3: DL Reasoner calls in the 2D case.
Figure 4: DL Reasoner calls in the 4D case with logarithmic
scaling.
Both figures show that the inference calls of
Pareto is near to the optimal lower bound LOWER-
BOUND and considerably better than the typical
divide-and-conquer algorithm Pareto-0 in both 2D
and 4D. These results are reasonable for the proposed
pattern matching algorithm due to the depth of an on-
tology being typically smaller than 30 and the patterns
having typically a small amount of constraints.
We see that the amount of Pareto results, which
is around the half of the LOWERBOUND value, is
very small. For this set the degree of matching must
be computed with respect to the fusion function to
find the most optimal solution out of the set of Pareto-
optimal solutions. This search can be done without to
call the DL reasoner, since we already know that these
solutions are satisfied.
5 CONCLUSIONS
We have shown how to use ontological background
DL knowledge to overcome the problem of noisy and
imprecise data. Our tolerant pattern matching ap-
proach can even address erroneous or missing patterns
by successively abstracting them. The algorithm sub-
stantially reduced the amount of these inference calls
to the DL reasoner. It is correct, complete and needs
a number of inference calls close to the lower bound.
It can be parameterized to have the ability to infere
approximate results.
ACKNOWLEDGEMENTS
This work was supported by the German Federal Min-
istry of Education and Research (BMBF) under the
grant 01IS08022A.
REFERENCES
Akra, M. and Bazzi, L. (1998). On the solution of linear re-
currence equations. Computational Optimization and
Applications, 10(2):195–210.
Baader, F., Horrocks, I., and Sattler, U. (2008). Handbook
of Knowledge Representation. Elsevier.
Batagelj, V. and Bren, M. (1995). Comparing Resemblance
Measures. Journal of Classification, 12(1):73–90.
Cadenas, J. M., Garrido, M. C., and Hernndez, J. J. (2005).
Heuristics to model the dependencies between fea-
tures in fuzzy pattern matching. In EUSFLAT.
Defourneaux, G. and Peltier, N. (1997). Analogy and ab-
duction in automated deduction. In IJCAI.
Dubois, D. and Prade, H. (1993). Tolerant fuzzy pattern
matching: An introduction.
Fanizzi, N. and d’Amato, C. (2006). A similarity measure
for the ALN description logic. In CILC, pages 26–27.
Gomez-Perez, A., Fernandez-Lopez, M., and Corcho, O.
(2004). Ontological Engineering. Springer.
He, Y., Chen, W., Yang, M., and Peng, W. (2004). Ontol-
ogy based cooperative intrusion detection system. In
Network and Parallel Computing, pages 419–426.
Hochberg, J., Jackson, K., Stallings, C., McClary, J.,
DuBois, D., and Ford., J. (1993). Nadir: An auto-
mated system for detecting network intrusion and mis-
use. Computers & Security, pages 235–248.
Kumar, S. and Spafford, E. H. (1995). A Software Architec-
ture to support Misuse Intrusion Detection. In NISC,
pages 194–204.
Lee, W. and Stolfo, S. J. (2000). A framework for con-
structing features and models for intrusion detection
systems. ACM Transactions on Information and Sys-
tem Security, 3:227–261.
Li, W. and Tian, S. (2010). An ontology-based intrusion
alerts correlation system. Expert Systems with Appli-
cations, 37(10):7138 – 7146.
Nicolett, M. and Kavanagh, K. M. (2010). Magic quadrant
for security information and event management.
Porras, P. (1993). STAT – a state transition analysis tool for
intrusion detection. Technical report, UCSB, USA.
Undercoffer, J., Joshi, A., and Pinkston, J. (2003). Mod-
eling computer attacks: An ontology for intrusion de-
tection. In RAID, pages 113–135.
EFFICIENT TOLERANT PATTERN MATCHING WITH CONSTRAINT ABSTRACTIONS IN DESCRIPTION LOGIC
261