메뉴 건너뛰기




Volumn , Issue , 2008, Pages 26-33

Using outlier detection to reduce false positives in intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; PARALLEL PROCESSING SYSTEMS; SOFTWARE PROTOTYPING;

EID: 57949100384     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NPC.2008.26     Document Type: Conference Paper
Times cited : (10)

References (15)
  • 1
    • 0242540448 scopus 로고    scopus 로고
    • Mining Intrusion Detection Alarms for Actionable Knowledge
    • ACM Press, New York
    • K. Julisch, M. Dacier, "Mining Intrusion Detection Alarms for Actionable Knowledge", Proceedings of KDD'02, ACM Press, New York, 2002, pp. 366-375.
    • (2002) Proceedings of KDD'02 , pp. 366-375
    • Julisch, K.1    Dacier, M.2
  • 2
    • 26444436687 scopus 로고    scopus 로고
    • Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection
    • Springer, Heidelberg
    • T. Pietraszek, "Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection", Proceedings of RAID'04, Springer, Heidelberg, 2004, pp. 102-124.
    • (2004) Proceedings of RAID'04 , pp. 102-124
    • Pietraszek, T.1
  • 3
    • 84949215209 scopus 로고    scopus 로고
    • Mining Alarm Clusters to Improve Alarm Handling Efficiency
    • IEEE Press, New York
    • K. Julisch, "Mining Alarm Clusters to Improve Alarm Handling Efficiency", Proceedings of ACSAC'01, IEEE Press, New York, 2001, pp. 12-21.
    • (2001) Proceedings of ACSAC'01 , pp. 12-21
    • Julisch, K.1
  • 4
    • 3142623031 scopus 로고    scopus 로고
    • Clustering Intrusion Detection Alarms to Support Root Cause Analysis
    • K. Julisch, "Clustering Intrusion Detection Alarms to Support Root Cause Analysis", ACM Transactions on Information and System Security, 2003, 6(4), pp. 443-471.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.4 , pp. 443-471
    • Julisch, K.1
  • 5
    • 0034446057 scopus 로고    scopus 로고
    • Developing Custom Intrusion Detection Filters Using Data Mining
    • IEEE Press, New York
    • C. Clifton, G. Gengo, "Developing Custom Intrusion Detection Filters Using Data Mining", Proceedings of MILCOM 2000, IEEE Press, New York, 2000, pp. 440-443.
    • (2000) Proceedings of MILCOM 2000 , pp. 440-443
    • Clifton, C.1    Gengo, G.2
  • 6
    • 26444495635 scopus 로고    scopus 로고
    • IDS False Alarm Reduction Using Continuous and Discontinuous Patterns
    • Springer, Heidelberg
    • A. Alharby, H. Imai, "IDS False Alarm Reduction Using Continuous and Discontinuous Patterns". Proceedings of ACNS 2005, Springer, Heidelberg, 2005, pp. 192-205.
    • (2005) Proceedings of ACNS 2005 , pp. 192-205
    • Alharby, A.1    Imai, H.2
  • 7
  • 8
    • 33847395411 scopus 로고    scopus 로고
    • Time Series Modeling for IDS Alert Management
    • ACM Press, New York
    • J. Viinikka, H. Debar, L. Mé, et al, "Time Series Modeling for IDS Alert Management", Proceedings of AsiaCCS'06, ACM Press, New York, 2006, pp. 102-113.
    • (2006) Proceedings of AsiaCCS'06 , pp. 102-113
    • Viinikka, J.1    Debar, H.2    Mé, L.3
  • 10
    • 57949107648 scopus 로고    scopus 로고
    • Detection of Novel Network Attacks Using Data Mining
    • IEEE Press, New York
    • L. Ertoz, E. Eilertson, A. Lazarevic, et al, "Detection of Novel Network Attacks Using Data Mining", Proceedings of DMSEC 2003, IEEE Press, New York, 2003, pp. 1-10.
    • (2003) Proceedings of DMSEC 2003 , pp. 1-10
    • Ertoz, L.1    Eilertson, E.2    Lazarevic, A.3
  • 12
    • 34249307704 scopus 로고    scopus 로고
    • FP-Outlier: Frequent Pattern Based Outlier Detection
    • Z. He, X. Xu, J.Z. Huang, et al, "FP-Outlier: Frequent Pattern Based Outlier Detection", Computer Science and Information System, 2005, 2(1), pp. 103-118.
    • (2005) Computer Science and Information System , vol.2 , Issue.1 , pp. 103-118
    • He, Z.1    Xu, X.2    Huang, J.Z.3
  • 13
    • 0035755010 scopus 로고    scopus 로고
    • Evaluation Document Clustering of Interactive Information Retrieval
    • ACM Press, New York
    • A. Leuski, "Evaluation Document Clustering of Interactive Information Retrieval", Proceedings of ACM CIKM'01, ACM Press, New York, 2001, pp. 33-40.
    • (2001) Proceedings of ACM CIKM'01 , pp. 33-40
    • Leuski, A.1
  • 15
    • 84944239811 scopus 로고    scopus 로고
    • The 1998 Lincoln Laboratory IDS Evaluation (A Critique)
    • Springer, Heidelberg
    • J. McHugh, "The 1998 Lincoln Laboratory IDS Evaluation (A Critique)", Proceedings of RAID 2000, Springer, Heidelberg, 2000, pp. 145-161.
    • (2000) Proceedings of RAID 2000 , pp. 145-161
    • McHugh, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.