메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 102-113

Time series modeling for IDS alert management

Author keywords

Experimentation; Security

Indexed keywords

INFORMATION SYSTEMS; TIME SERIES ANALYSIS; USER INTERFACES;

EID: 33847395411     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1128817.1128835     Document Type: Conference Paper
Times cited : (64)

References (19)
  • 1
    • 0033281215 scopus 로고    scopus 로고
    • The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion Detection
    • Nov
    • S. Axelsson. The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion Detection. In Proc. of the ACM CCS'99, Nov. 1999.
    • (1999) Proc. of the ACM CCS'99
    • Axelsson, S.1
  • 5
    • 18744414884 scopus 로고    scopus 로고
    • Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems
    • Springer-Verlag
    • H. Debar and B. Morin. Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems. In Proc. of the RAID'02 Springer-Verlag, 2002.
    • (2002) Proc. of the RAID'02
    • Debar, H.1    Morin, B.2
  • 6
    • 0242529344 scopus 로고    scopus 로고
    • Aggregation and Correlation of Intrusion-Detection Alerts
    • Springer-Verlag
    • H. Debar and A. Wespi. Aggregation and Correlation of Intrusion-Detection Alerts. In Proc. of the RAID'01. Springer-Verlag, 2001.
    • (2001) Proc. of the RAID'01
    • Debar, H.1    Wespi, A.2
  • 7
    • 84949215209 scopus 로고    scopus 로고
    • Mining Alarm Clusters to Improve Alarm Handling Efficiency
    • Dec
    • K. Julisch. Mining Alarm Clusters to Improve Alarm Handling Efficiency. In Proc. of the ACS AC'01, Dec. 2001.
    • (2001) Proc. of the ACS AC'01
    • Julisch, K.1
  • 8
    • 0242540448 scopus 로고    scopus 로고
    • Mining Intrusion. Detection Alarms for Actionable Knowledge
    • K. Julisch and M. Dacier. Mining Intrusion. Detection Alarms for Actionable Knowledge. In Proc. of the SIGKDD'02, 2002.
    • (2002) Proc. of the SIGKDD'02
    • Julisch, K.1    Dacier, M.2
  • 9
    • 33750329114 scopus 로고    scopus 로고
    • Alert verification: Determining the success of intrusion attempts
    • Dortmund, Germany, July
    • C. Kruegel and W. Robertson. Alert verification: Determining the success of intrusion attempts. In Proc. of the DIMVA '04, Dortmund, Germany, July 2004.
    • (2004) Proc. of the DIMVA '04
    • Kruegel, C.1    Robertson, W.2
  • 10
    • 0017846358 scopus 로고
    • On a Measure of Lack of Fit in Time Series Models
    • Aug
    • G. M. Ljung and G. E. P. Box. On a Measure of Lack of Fit in Time Series Models. Biometrica, 65(2):297-303, Aug. 1978.
    • (1978) Biometrica , vol.65 , Issue.2 , pp. 297-303
    • Ljung, G.M.1    Box, G.E.P.2
  • 12
    • 34247369195 scopus 로고    scopus 로고
    • S. Manganaris, M. Christensen, D. Zerkle, and K. Hermiz. A Data Mining Analysis of RTID Alarms, RAID'99, 1999.
    • S. Manganaris, M. Christensen, D. Zerkle, and K. Hermiz. A Data Mining Analysis of RTID Alarms, RAID'99, 1999.
  • 14
    • 3142546411 scopus 로고    scopus 로고
    • A Mission-Impact-Based Approach to INFOSEC Alarm Correlation
    • Springer-Verlag
    • P. A. Porras, M. W. Fong, and A. Valdes. A Mission-Impact-Based Approach to INFOSEC Alarm Correlation. In Proc. of the RAID'02. Springer-Verlag, 2002.
    • (2002) Proc. of the RAID'02
    • Porras, P.A.1    Fong, M.W.2    Valdes, A.3
  • 15
    • 14544297015 scopus 로고    scopus 로고
    • Statistical Causality Analysis of INFOSEC Alert Data
    • Springer-Verlag
    • X. Qin and W. Lee. Statistical Causality Analysis of INFOSEC Alert Data. In Proc. of the RAID'09. Springer-Verlag, 2003.
    • (2003) Proc. of the RAID'09
    • Qin, X.1    Lee, W.2
  • 16
    • 0037952266 scopus 로고    scopus 로고
    • Probabilistic Alert Correlation
    • Springer Verlag
    • A. Valdes and K. Skinner. Probabilistic Alert Correlation. In Proc. of the RAID'01. Springer Verlag, 2001.
    • (2001) Proc. of the RAID'01
    • Valdes, A.1    Skinner, K.2
  • 17
    • 34247367474 scopus 로고    scopus 로고
    • Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information
    • Springer-Verlag
    • J. Viinikka and H. Debar. Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information. In Proc. of the RAID'04, Springer-Verlag, 2004.
    • (2004) Proc. of the RAID'04
    • Viinikka, J.1    Debar, H.2
  • 18
    • 0036864028 scopus 로고    scopus 로고
    • EWMA Techniques for Computer Intrusion Detection Through Anomalous Changes In Event Intensity
    • N. Ye, C. Borror, and Y. Chang. EWMA Techniques for Computer Intrusion Detection Through Anomalous Changes In Event Intensity. Quality and Reliability Engineering International, 18:443-451, 2002.
    • (2002) Quality and Reliability Engineering International , vol.18 , pp. 443-451
    • Ye, N.1    Borror, C.2    Chang, Y.3
  • 19
    • 0037333205 scopus 로고    scopus 로고
    • Computer Intrusion Detection Through EWMA for Autocorrelated and Uncorrelated Data
    • Mar
    • N. Ye, S. Vilbert, and Q. Chen. Computer Intrusion Detection Through EWMA for Autocorrelated and Uncorrelated Data. IEEE Transactions on Reliability, 52(1):75-82, Mar. 2003.
    • (2003) IEEE Transactions on Reliability , vol.52 , Issue.1 , pp. 75-82
    • Ye, N.1    Vilbert, S.2    Chen, Q.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.