메뉴 건너뛰기




Volumn 32, Issue 2, 2009, Pages 419-430

Intrusion detection alarms reduction using root cause analysis and clustering

Author keywords

Alarms clustering; False positive; Intrusion detection system; Network security; Root causes

Indexed keywords

ALARM SYSTEMS; COMPUTER CRIME; ERRORS; INTERNET; NETWORK SECURITY; SECURITY OF DATA; TURBULENT FLOW;

EID: 58149488644     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2008.11.012     Document Type: Article
Times cited : (77)

References (41)
  • 2
    • 3142623031 scopus 로고    scopus 로고
    • Clustering intrusion detection alarms to support root cause analysis
    • Julisch K. Clustering intrusion detection alarms to support root cause analysis. ACM Transaction on Information and System Security 6 (2003) 443-471
    • (2003) ACM Transaction on Information and System Security , vol.6 , pp. 443-471
    • Julisch, K.1
  • 4
    • 58149481705 scopus 로고    scopus 로고
    • K. Julisch, Using root cause analysis to handle intrusion detection alarms, Ph.D. dissertation, University of Dortmund, 2003.
    • K. Julisch, Using root cause analysis to handle intrusion detection alarms, Ph.D. dissertation, University of Dortmund, 2003.
  • 5
    • 58149522857 scopus 로고    scopus 로고
    • O.M. Dain, R.K Cunningham, Fusing a heterogeneous alert stream into scenarios, in: Proceeding of the 2001 ACM Workshop on Data Mining for Security Applications, 2001, pp. 231-235.
    • O.M. Dain, R.K Cunningham, Fusing a heterogeneous alert stream into scenarios, in: Proceeding of the 2001 ACM Workshop on Data Mining for Security Applications, 2001, pp. 231-235.
  • 7
    • 58149481703 scopus 로고    scopus 로고
    • S.O. Al-Mamory, H. Zhang, A survey on IDS alerts processing techniques, in: Proceeding of the 6th WSEAS International Conference on Information Security and Privacy (ISP'07), Spain, 2007, pp. 69-78.
    • S.O. Al-Mamory, H. Zhang, A survey on IDS alerts processing techniques, in: Proceeding of the 6th WSEAS International Conference on Information Security and Privacy (ISP'07), Spain, 2007, pp. 69-78.
  • 8
    • 33744979029 scopus 로고    scopus 로고
    • A. Siraj, R. Vaughn, Multi-level alert clustering for intrusion detection sensor data, in: Proceeding of North American Fuzzy Information Processing Society International Conference on Soft Computing for Real World Applications, Michigan, 2005.
    • A. Siraj, R. Vaughn, Multi-level alert clustering for intrusion detection sensor data, in: Proceeding of North American Fuzzy Information Processing Society International Conference on Soft Computing for Real World Applications, Michigan, 2005.
  • 9
    • 84947603083 scopus 로고    scopus 로고
    • A. Valdes, K. Skinner, Probabilistic alert correlation, in: Proceeding of the Recent Advances in Intrusion Detection, LNCS 2212, 2001, pp. 54-68.
    • A. Valdes, K. Skinner, Probabilistic alert correlation, in: Proceeding of the Recent Advances in Intrusion Detection, LNCS 2212, 2001, pp. 54-68.
  • 12
    • 26444436687 scopus 로고    scopus 로고
    • T. Pietraszek, Using adaptive alert classification to reduce false positives in intrusion detection, in: Proceeding of the Recent Advances in Intrusion Detection, France, 2004, pp. 102-124.
    • T. Pietraszek, Using adaptive alert classification to reduce false positives in intrusion detection, in: Proceeding of the Recent Advances in Intrusion Detection, France, 2004, pp. 102-124.
  • 14
    • 0024028002 scopus 로고    scopus 로고
    • M. Paradies, D. Busch, Root cause analysis at Savannah river plant, in: Proceeding of the IEEE Conference on Human Factors and Power Plants, 1988, pp. 479-483.
    • M. Paradies, D. Busch, Root cause analysis at Savannah river plant, in: Proceeding of the IEEE Conference on Human Factors and Power Plants, 1988, pp. 479-483.
  • 15
    • 85090433665 scopus 로고    scopus 로고
    • M. Roesch, Snort-lightweight intrusion detection for networks, in: Proceeding of the 1999 USENIX LISA Conference, 1999, pp. 229-238.
    • M. Roesch, Snort-lightweight intrusion detection for networks, in: Proceeding of the 1999 USENIX LISA Conference, 1999, pp. 229-238.
  • 18
    • 0002479811 scopus 로고    scopus 로고
    • Exploration of the power of attribute-oriented induction in data mining
    • Fayyad U.M., Piatetsky-Shapiro G., Smyth P., and Uthurusamy R. (Eds), AAAI/MIT Press
    • Han J., and Fu Y. Exploration of the power of attribute-oriented induction in data mining. In: Fayyad U.M., Piatetsky-Shapiro G., Smyth P., and Uthurusamy R. (Eds). Advances in Knowledge Discovery and Data Mining (1996), AAAI/MIT Press 399-421
    • (1996) Advances in Knowledge Discovery and Data Mining , pp. 399-421
    • Han, J.1    Fu, Y.2
  • 20
    • 58149496270 scopus 로고    scopus 로고
    • J. Dougherty, R. Kohavi, M. Sahami, Supervised and unsupervised discretization of continuous features, in: Proceedings of the 12th International Conference on Machine Learning, 1995, pp. 194-202.
    • J. Dougherty, R. Kohavi, M. Sahami, Supervised and unsupervised discretization of continuous features, in: Proceedings of the 12th International Conference on Machine Learning, 1995, pp. 194-202.
  • 21
    • 58149522246 scopus 로고    scopus 로고
    • J. Han, Y. Fu, Dynamic generation and refinement of concept hierarchies for knowledge discovery in databases, in: Proceedings of the AAAI Workshop on Knowledge Discovery in Databases, 1994, pp. 157-168.
    • J. Han, Y. Fu, Dynamic generation and refinement of concept hierarchies for knowledge discovery in databases, in: Proceedings of the AAAI Workshop on Knowledge Discovery in Databases, 1994, pp. 157-168.
  • 22
    • 58149479516 scopus 로고    scopus 로고
    • Y. Lu, Concept Hierarchy in Data Mining: Specification, Generation, and Implementation, Master's Thesis, Simon Fraser University, Canada, 1997.
    • Y. Lu, Concept Hierarchy in Data Mining: Specification, Generation, and Implementation, Master's Thesis, Simon Fraser University, Canada, 1997.
  • 23
    • 58149498469 scopus 로고    scopus 로고
    • T. Pietraszek, Alert classification to reduce false positives in intrusion detection, Ph.D. dissertation, Institut für Informatik, Albert-Ludwigs-Universität Freiburg, Germany, July 2006.
    • T. Pietraszek, Alert classification to reduce false positives in intrusion detection, Ph.D. dissertation, Institut für Informatik, Albert-Ludwigs-Universität Freiburg, Germany, July 2006.
  • 25
    • 58149503909 scopus 로고    scopus 로고
    • O. Heinonen H. Mannila, Attribute-oriented induction and conceptual clustering, Technical Report, University of Helsinki, Department of Computer Science, 1996.
    • O. Heinonen H. Mannila, Attribute-oriented induction and conceptual clustering, Technical Report, University of Helsinki, Department of Computer Science, 1996.
  • 26
    • 84949215209 scopus 로고    scopus 로고
    • K. Julisch, Mining alarm clusters to improve alarm handling efficiency, in: Proceeding of the 17th Annual Computer Security Applications Conference, New Orleans, 2001, pp. 12-21.
    • K. Julisch, Mining alarm clusters to improve alarm handling efficiency, in: Proceeding of the 17th Annual Computer Security Applications Conference, New Orleans, 2001, pp. 12-21.
  • 31
    • 35048874596 scopus 로고    scopus 로고
    • M. Halkidi, M. Vazirgiannis, I. Batistakis, Quality scheme assessment in the clustering process, in: Proceeding of the 4th European Conference on Principles of Data Mining and Knowledge Discovery, 2000, pp. 265-276.
    • M. Halkidi, M. Vazirgiannis, I. Batistakis, Quality scheme assessment in the clustering process, in: Proceeding of the 4th European Conference on Principles of Data Mining and Knowledge Discovery, 2000, pp. 265-276.
  • 35
    • 0023453329 scopus 로고
    • Silhouettes: a graphical aid to the interpretation and validation of cluster analysis
    • Rousseeuw P.J. Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. Journal of Computational and Applied Mathematics 20 1 (1987) 53-65
    • (1987) Journal of Computational and Applied Mathematics , vol.20 , Issue.1 , pp. 53-65
    • Rousseeuw, P.J.1
  • 38
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
    • Mchugh J. Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security 3 4 (2000) 262-294
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • Mchugh, J.1
  • 39
    • 58149522253 scopus 로고    scopus 로고
    • MIT Lincoln Laboratory, 1999 DARPA intrusion detection evaluation data set, 1999. Web page at .
    • MIT Lincoln Laboratory, 1999 DARPA intrusion detection evaluation data set, 1999. Web page at .
  • 41
    • 58149522252 scopus 로고    scopus 로고
    • J. Han, Y. Cai, N. Cercone, Knowledge discovery in databases: an attribute-oriented approach, in: Proceeding of the 18th International Conference on Very Large Databases, 1992, pp. 547-559.
    • J. Han, Y. Cai, N. Cercone, Knowledge discovery in databases: an attribute-oriented approach, in: Proceeding of the 18th International Conference on Very Large Databases, 1992, pp. 547-559.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.