메뉴 건너뛰기




Volumn , Issue , 2002, Pages 366-375

Mining intrusion detection alarms for actionable knowledge

Author keywords

Alarm investigation; Conceptual clustering; Data mining; Episode rules; Intrusion detection

Indexed keywords

DATA HANDLING; ENTERPRISE RESOURCE PLANNING; KNOWLEDGE BASED SYSTEMS; RESPONSE TIME (COMPUTER SYSTEMS); SECURITY OF DATA;

EID: 0242540448     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/775094.775101     Document Type: Conference Paper
Times cited : (211)

References (42)
  • 1
    • 0003914522 scopus 로고    scopus 로고
    • State of the practice of intrusion detection technologies
    • Technical report, Carnegie Mellon University, January
    • J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel and E. Stoner. State of the Practice of Intrusion Detection Technologies. Technical report, Carnegie Mellon University, January 2000. http://www.cert.org/archive/pdf/99tr028.pdf.
    • (2000)
    • Allen, J.1    Christie, A.2    Fithen, W.3    Mchugh, J.4    Pickel, J.5    Stoner, E.6
  • 2
    • 0003907293 scopus 로고    scopus 로고
    • Macmillan Technical Publishing
    • R. Bace. Intrusion Detection. Macmillan Technical Publishing, 2000.
    • (2000) Intrusion Detection
    • Bace, R.1
  • 4
    • 0038324535 scopus 로고    scopus 로고
    • D. Barbará and S. Jajodia, editors; Kluwer Academic Publisher, Boston
    • D. Barbará and S. Jajodia, editors. Applications of Data Mining in Computer Security. Kluwer Academic Publisher, Boston, 2002.
    • (2002) Applications of Data Mining in Computer Security
  • 7
    • 0000537685 scopus 로고
    • Conceptual clustering in a first order logic representation
    • G. Bisson. Conceptual Clustering in a First Order Logic Representation. In 10th European Conf. on Artificial Intelligence, pages 458-462, 1992.
    • (1992) 10th European Conf. on Artificial Intelligence , pp. 458-462
    • Bisson, G.1
  • 9
    • 3142652076 scopus 로고    scopus 로고
    • IBM outsourced solution
    • J. Broderick - Editor
    • J. Broderick - Editor. IBM Outsourced Solution, 1998. http://www.infoworld.com/cgi-bin/displayTC.pl?/980504sb3-ibm.htm.
    • (1998)
  • 10
    • 85083464467 scopus 로고    scopus 로고
    • Toward scalable learning with non-uniform class and cost distributions: A case study in credit card fraud detection
    • P. Chan and S. Stolfo. Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection. In 4th Int'l Conf. on Knowledge Discovery and Data Mining, pages 164-168, 1998.
    • (1998) 4th Int'l Conf. on Knowledge Discovery and Data Mining , pp. 164-168
    • Chan, P.1    Stolfo, S.2
  • 13
    • 0034226287 scopus 로고    scopus 로고
    • A revised taxonomy for intrusion detection systems
    • H. Debar, M. Dacier and A. Wespi. A Revised Taxonomy for Intrusion Detection Systems, Annales des Télécommunications, 55(7-8):361-378, 2000.
    • (2000) Annales des Télécommunications , vol.55 , Issue.7-8 , pp. 361-378
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 16
    • 0343442766 scopus 로고
    • Knowledge acquisition via incremental conceptual clustering
    • D. H. Fisher. Knowledge Acquisition Via Incremental Conceptual Clustering. Machine Learning, 2:139-172, 1987.
    • (1987) Machine Learning , vol.2 , pp. 139-172
    • Fisher, D.H.1
  • 20
    • 0034228041 scopus 로고    scopus 로고
    • ROCK: A robust clustering algorithm for categorical attributes
    • S. Guha, R. Rastogi, and K. Shim. ROCK: A Robust Clustering Algorithm for Categorical Attributes. Information Systems, 25(5):345-366, 2000.
    • (2000) Information Systems , vol.25 , Issue.5 , pp. 345-366
    • Guha, S.1    Rastogi, R.2    Shim, K.3
  • 22
    • 0002889848 scopus 로고
    • Dynamic generation and refinement of concept hierarchies for knowledge discovery in databases
    • J. Han and Y. Fu. Dynamic Generation and Refinement of Concept Hierarchies for Knowledge Discovery in Databases. In Workshop on Knowledge Discovery in Databases, pages 157-168, 1994.
    • (1994) Workshop on Knowledge Discovery in Databases , pp. 157-168
    • Han, J.1    Fu, Y.2
  • 23
    • 0002479811 scopus 로고    scopus 로고
    • Exploration of the power of attribute-oriented induction in data mining
    • In U. M. Fayyad, G. Piatetsky-Shapiro, P. Smyth, and R. Uthurusamy, editors; AAAI Press/MIT Press
    • J. Han and Y. Fu. Exploration of the Power of Attribute-Oriented Induction in Data Mining. In U. M. Fayyad, G. Piatetsky-Shapiro, P. Smyth, and R. Uthurusamy, editors Advances in Knowledge Discovery and Data Mining. AAAI Press/MIT Press, 1996.
    • (1996) Advances in Knowledge Discovery and Data Mining
    • Han, J.1    Fu, Y.2
  • 25
    • 25544437096 scopus 로고    scopus 로고
    • Attribute-oriented induction and conceptual clustering
    • Technical Report Report C-1996-2, University of Helsinki
    • O. Heinonen and H. Mannila. Attribute-Oriented Induction and Conceptual Clustering. Technical Report Report C-1996-2, University of Helsinki, 1996.
    • (1996)
    • Heinonen, O.1    Mannila, H.2
  • 26
    • 25544433827 scopus 로고    scopus 로고
    • Mining event data for actionable patterns
    • In The Computer Measurement Group
    • J. L. Hellerstein and S. Ma. Mining Event Data for Actionable Patterns. In The Computer Measurement Group, 2000.
    • (2000)
    • Hellerstein, J.L.1    Ma, S.2
  • 31
    • 0011223337 scopus 로고    scopus 로고
    • A knowledge discovery methodology for telecommunication network alarm data
    • PhD thesis, University of Helsinky (Finland)
    • M. Klemettinen. A Knowledge Discovery Methodology for Telecommunication Network Alarm Data. PhD thesis, University of Helsinky (Finland), 1999.
    • (1999)
    • Klemettinen, M.1
  • 32
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • W. Lee and S.J. Stolfo. A Framework for Constructing Features and Models for Intrusion Detection Systems. ACM Transactions on Information and System Security, 3(4):227-261, 2000.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 38
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks, 31(23-24):2435-2463 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 39
    • 3142682919 scopus 로고
    • Criteria for polynomial time (conceptual) clustering
    • L. Pitt and R. E. Reinke. Criteria for Polynomial Time (Conceptual) Clustering. Machine Learning, 2(4):371-396, 1987.
    • (1987) Machine Learning , vol.2 , Issue.4 , pp. 371-396
    • Pitt, L.1    Reinke, R.E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.