메뉴 건너뛰기




Volumn 6, Issue 4, 2003, Pages 443-471

Clustering intrusion detection alarms to support root cause analysis

Author keywords

Cluster analysis; Data mining; False positives; Intrusion detection; Root cause analysis

Indexed keywords

CLUSTER ANALYSIS; FALSE POSITIVES; INTRUSION DETECTION; ROOT CAUSE ANALYSIS;

EID: 3142623031     PISSN: 10949224     EISSN: None     Source Type: Journal    
DOI: 10.1145/950191.950192     Document Type: Review
Times cited : (348)

References (70)
  • 2
    • 0003914522 scopus 로고    scopus 로고
    • State of the practice of intrusion detection technologies
    • Carnegie Mellon University
    • ALLEN, J., CHRISTIE, A., FITHEN, W., McHuGH, J., PICKEL, J., AND STONER, E. 2000. State of the practice of intrusion detection technologies. Tech. Rep., Carnegie Mellon University. http://www.cert.org/archive/pdf/99tr028.pdf.
    • (2000) Tech. Rep.
    • Allen, J.1    Christie, A.2    Fithen, W.3    McHugh, J.4    Pickel, J.5    Stoner, E.6
  • 5
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • AXELSSON, S. 2000. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security 3, 3, 186-205.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 6
    • 0003907293 scopus 로고    scopus 로고
    • Macmillan Technical Publishing
    • BACE, R. 2000. Intrusion Detection. Macmillan Technical Publishing.
    • (2000) Intrusion Detection
    • Bace, R.1
  • 11
    • 0028375730 scopus 로고
    • Alarm correlation and fault identification in communication networks
    • BOULOUTAS, A., CALO, S., AND FINKEL, A. 1994. Alarm correlation and fault identification in communication networks. IEEE Transactions on Communications 42, 2-4, 523-533.
    • (1994) IEEE Transactions on Communications , vol.42 , Issue.2-4 , pp. 523-533
    • Bouloutas, A.1    Calo, S.2    Finkel, A.3
  • 15
    • 85083464467 scopus 로고    scopus 로고
    • Toward scalable learning with non-uniform class and cost distributions: A case study in credit card fraud detection
    • CHAN, P. AND STOLFO, S. 1998. Toward scalable learning with non-uniform class and cost distributions: A case study in credit card fraud detection. In 4th International Conference on Knowledge Discovery and Data Mining, 164-168.
    • (1998) 4th International Conference on Knowledge Discovery and Data Mining , pp. 164-168
    • Chan, P.1    Stolfo, S.2
  • 16
  • 21
    • 0034226287 scopus 로고    scopus 로고
    • A revised taxonomy for intrusion detection systems
    • DEBAR, H., DACIER, M., AND WESPI, A. 2000. A revised taxonomy for intrusion detection systems. Annales des Télécommunications 55, 7-8, 361-378.
    • (2000) Annales des Télécommunications , vol.55 , Issue.7-8 , pp. 361-378
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 28
    • 0002889848 scopus 로고
    • Dynamic generation and refinement of concept hierarchies for knowledge discovery in databases
    • HAN, J. AND FU, Y. 1994. Dynamic generation and refinement of concept hierarchies for knowledge discovery in databases. In Proceedings of the AAAI Workshop on Knowledge Discovery in Databases, 157-168.
    • (1994) Proceedings of the AAAI Workshop on Knowledge Discovery in Databases , pp. 157-168
    • Han, J.1    Fu, Y.2
  • 31
    • 0005266923 scopus 로고
    • Towards a practical alarm correlation system
    • A. S. Sethi, Y. Raynaud, and F. Faure-Vincent, Eds. Chapman & Hall, London
    • HOUCK, K., CALO, S., AND FINKEL, A. 1995. Towards a practical alarm correlation system. In 4th International Symposium on Integrated Network Management. A. S. Sethi, Y. Raynaud, and F. Faure-Vincent, Eds. Chapman & Hall, London, 226-237.
    • (1995) 4th International Symposium on Integrated Network Management , pp. 226-237
    • Houck, K.1    Calo, S.2    Finkel, A.3
  • 32
    • 0027150412 scopus 로고
    • USTAT: A real-time intrusion detection system for UNIX
    • Oakland, CA
    • ILUNG, K. 1993. USTAT: A real-time intrusion detection system for UNIX. In IEEE Symposium on Security and Privacy, Oakland, CA, 16-28.
    • (1993) IEEE Symposium on Security and Privacy , pp. 16-28
    • Ilung, K.1
  • 35
    • 0003065998 scopus 로고
    • Real-time telecommunication network management: Extending event correlation with temporal constraints
    • A. S. Sethi, Y. Raynaud, and F. Faure-Vincent, Eds. Chapman & Hall, London
    • JAKOBSON, G. AND WEISSMAN, M. D. 1995. Real-time telecommunication network management: Extending event correlation with temporal constraints. In 4th International Symposium on Integrated Network Management. A. S. Sethi, Y. Raynaud, and F. Faure-Vincent, Eds. Chapman & Hall, London, 290-301.
    • (1995) 4th International Symposium on Integrated Network Management , pp. 290-301
    • Jakobson, G.1    Weissman, M.D.2
  • 40
    • 0003414571 scopus 로고
    • Dependable Computing and Fault-Tolerant Systems. Springer-Verlag, Vienna
    • LAPRIE, J., Ed. 1992. Dependability: Basic Concepts and Terminology. Dependable Computing and Fault-Tolerant Systems, vol. 5. Springer-Verlag, Vienna.
    • (1992) Dependability: Basic Concepts and Terminology , vol.5
    • Laprie, J.1
  • 41
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • LEE, W. AND STOLFO, S. J. 2000. A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security 3, 4, 227-261.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 42
    • 0027727530 scopus 로고
    • A case-based reasoning approach to the resolution of faults in communication networks
    • H.-G. Hegering and Y. Yemini, Eds. North Holland, Amsterdam
    • LEWIS, L. 1993. A case-based reasoning approach to the resolution of faults in communication networks. In 3th International Symposium on Integrated Network Management. H.-G. Hegering and Y. Yemini, Eds. North Holland, Amsterdam, 671-682.
    • (1993) 3th International Symposium on Integrated Network Management , pp. 671-682
    • Lewis, L.1
  • 44
    • 84958970105 scopus 로고    scopus 로고
    • The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection
    • LNCS. Springer Berlin, Verlag
    • LIPPMANN, R., WEBSTER, S., AND STETSON, D. 2002. The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection. In 5th Workshop on Recent Advances in Intrusion Detection (RAID). LNCS, vol. 2516. Springer Berlin, Verlag, 307-326.
    • (2002) 5th Workshop on Recent Advances in Intrusion Detection (RAID) , vol.2516 , pp. 307-326
    • Lippmann, R.1    Webster, S.2    Stetson, D.3
  • 47
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
    • MCHUGH, J. 2000. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security 3, 4, 262-294.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 52
    • 0002358483 scopus 로고
    • Event correlation using rule and object based techniques
    • A. S. Sethi, Y. Raynaud, and F. Faure-Vincent, Eds. Chapman & Hall, London
    • NYGATE, Y. A. 1995. Event correlation using rule and object based techniques. In 4th International Symposium on Integrated Network Management. A. S. Sethi, Y. Raynaud, and F. Faure-Vincent, Eds. Chapman & Hall, London, 278-289.
    • (1995) 4th International Symposium on Integrated Network Management , pp. 278-289
    • Nygate, Y.A.1
  • 55
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • PAXSON, V. 1999. Bro: A system for detecting network intruders in real-time. Computer Networks 31, 23/24, 2435-2463.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 56
    • 0023347137 scopus 로고
    • A probabilistic causal model for diagnostic problem solving -Part I: Diagnostic strategy
    • PENG, Y. AND REGGIA, J. A. 1987a. A probabilistic causal model for diagnostic problem solving -Part I: Diagnostic strategy. IEEE Transactions on Syst. Man Cybern. 17, 3, 395-404.
    • (1987) IEEE Transactions on Syst. Man Cybern. , vol.17 , Issue.3 , pp. 395-404
    • Peng, Y.1    Reggia, J.A.2
  • 57
    • 84939750950 scopus 로고
    • A probabilistic causal model for diagnostic problem solving -Part I: Integrating symbolic causal inference with numeric probabilistic inference
    • PENG, Y. AND REGGIA, J. A. 1987b. A probabilistic causal model for diagnostic problem solving -Part I: Integrating symbolic causal inference with numeric probabilistic inference. IEEE Trans. Syst. Man. Cybern. 17, 2, 146-162.
    • (1987) IEEE Trans. Syst. Man. Cybern. , vol.17 , Issue.2 , pp. 146-162
    • Peng, Y.1    Reggia, J.A.2
  • 58
    • 3142545814 scopus 로고    scopus 로고
    • Architecture and Revised Model of MAFTIA
    • University of Newcastle upon Tyne
    • POWELL, D. AND STROUD, R. 2001. Architecture and Revised Model of MAFTIA. Tech. Rep. CS-TR-749, University of Newcastle upon Tyne.
    • (2001) Tech. Rep. , vol.CS-TR-749
    • Powell, D.1    Stroud, R.2
  • 60
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, evasion, and denial of service: Eluding network intrusion detection
    • Secure Networks, Inc.
    • PTACEK, T. H. AND NEWSHAM, T. N. 1998. Insertion, evasion, and denial of service: Eluding network intrusion detection. Tech. Rep., Secure Networks, Inc.
    • (1998) Tech. Rep.
    • Ptacek, T.H.1    Newsham, T.N.2
  • 63
    • 0002016474 scopus 로고    scopus 로고
    • Semantic similarity in a taxonomy: An information-based measure and its application to problems of ambiguity in natural language
    • RESNIK, P. 1999. Semantic similarity in a taxonomy: An information-based measure and its application to problems of ambiguity in natural language. Journal of Artificial Intelligence Research 11, 95-130.
    • (1999) Journal of Artificial Intelligence Research , vol.11 , pp. 95-130
    • Resnik, P.1
  • 64
    • 0031684427 scopus 로고    scopus 로고
    • Combinatorial pattern discovery in biological sequences: The TEIRESIAS algorithm
    • RIGOUTSOS, I. AND FLORATOS, A. 1998. Combinatorial pattern discovery in biological sequences: The TEIRESIAS algorithm. Bioinformatics 14, 1, 55-67.
    • (1998) Bioinformatics , vol.14 , Issue.1 , pp. 55-67
    • Rigoutsos, I.1    Floratos, A.2
  • 67
    • 0004141908 scopus 로고    scopus 로고
    • Prentice-Hall, Englewood Cliffs, NJ
    • TANENBAUM, A. S. 1996. Computer Networks. Prentice-Hall, Englewood Cliffs, NJ.
    • (1996) Computer Networks
    • Tanenbaum, A.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.