메뉴 건너뛰기




Volumn 6, Issue 1, 2010, Pages 43-55

New data mining technique to enhance IDS alarms quality

Author keywords

[No Author keywords available]

Indexed keywords

BACKGROUND KNOWLEDGE; DATA MINING TECHNIQUES; DATA SETS; FALSE POSITIVE; INTRUSION DETECTION SYSTEMS; REDUCTION RATIOS; ROOT CAUSE;

EID: 74849129720     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-008-0104-2     Document Type: Article
Times cited : (6)

References (35)
  • 2
    • 3142623031 scopus 로고    scopus 로고
    • Clustering intrusion detection alarms to support root cause analysis
    • Julisch K.: Clustering intrusion detection alarms to support root cause analysis. ACM Trans. Inf. Syst. Secur. 6, 443-471 (2003).
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , pp. 443-471
    • Julisch, K.1
  • 3
    • 23944456320 scopus 로고    scopus 로고
    • TRINETR: An architecture for collaborative intrusion detection and knowledge-based alert evaluation
    • Yu J., Reddy Y. V. R., Selliah S., Reddy S., Bharadwaj V., Kankanahalli S.: TRINETR: an architecture for collaborative intrusion detection and knowledge-based alert evaluation. J. Adv. Eng. Inf. 19, 93-101 (2005).
    • (2005) J. Adv. Eng. Inf. , vol.19 , pp. 93-101
    • Yu, J.1    Reddy, Y.V.R.2    Selliah, S.3    Reddy, S.4    Bharadwaj, V.5    Kankanahalli, S.6
  • 4
    • 33646037321 scopus 로고    scopus 로고
    • Alarm clustering for intrusion detection systems in computer networks
    • Perdisci R., Giacinto G., Roli F.: Alarm clustering for intrusion detection systems in computer networks. J. Eng. Appl. Artif. Intell. 19, 429-438 (2006).
    • (2006) J. Eng. Appl. Artif. Intell. , vol.19 , pp. 429-438
    • Perdisci, R.1    Giacinto, G.2    Roli, F.3
  • 12
    • 26444436687 scopus 로고    scopus 로고
    • Using adaptive alert classification to reduce false positives in intrusion detection
    • Pietraszek, T.: Using adaptive alert classification to reduce false positives in intrusion detection. In: Proceeding of the Recent advances in intrusion detection, France, pp. 102-124 (2004).
    • (2004) Proceeding of the Recent advances in intrusion detection , pp. 102-124
    • Pietraszek, T.1
  • 14
    • 0009060610 scopus 로고
    • Packets found on an Internet
    • Bellovin S. M.: Packets found on an Internet. J. Comput. Commun. Rev. 23, 26-31 (1993).
    • (1993) J. Comput. Commun. Rev. , vol.23 , pp. 26-31
    • Bellovin, S.M.1
  • 15
    • 0002479811 scopus 로고    scopus 로고
    • Exploration of the power of attribute-oriented induction in data mining
    • U. M. Fayyad, G. Piatetsky-Shapiro, P. Smyth, and R. Uthurusamy (Eds.), Cambridge: AAAI/MIT Press
    • Han J., Fu Y.: Exploration of the power of attribute-oriented induction in data mining. In: Fayyad, U. M., Piatetsky-Shapiro, G., Smyth, P., Uthurusamy, R.(eds) Advances in Knowledge Discovery and Data Mining, pp. 399-421. AAAI/MIT Press, Cambridge (1996).
    • (1996) Advances in Knowledge Discovery and Data Mining , pp. 399-421
    • Han, J.1    Fu, Y.2
  • 16
    • 0027542839 scopus 로고
    • Data-driven discovery of quantitative rules in relational databases
    • Han J., Cai Y., Cercone N.: Data-driven discovery of quantitative rules in relational databases. IEEE Trans. Knowl. Data Eng. 5, 29-40 (1993).
    • (1993) IEEE Trans. Knowl. Data Eng. , vol.5 , pp. 29-40
    • Han, J.1    Cai, Y.2    Cercone, N.3
  • 26
    • 0023453329 scopus 로고
    • Silhouettes: A graphical aid to the interpretation and validation of cluster analysis
    • Rousseeuw P. J.: Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. J. Comput. Appl. Math. 20(1), 53-65 (1987).
    • (1987) J. Comput. Appl. Math. , vol.20 , Issue.1 , pp. 53-65
    • Rousseeuw, P.J.1
  • 33
    • 84947286061 scopus 로고    scopus 로고
    • Wang, J., Lee, I.: Measuring false-positive by automated real-time correlated hacking behavior analysis. In: Proceedings of the 4th International Conference on Information Security. LNCS, vol. 2200, pp. 512-535 (2001).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.