메뉴 건너뛰기




Volumn 13, Issue 1, 2010, Pages 19-29

Filtering intrusion detection alarms

Author keywords

Alarm filtering; Computer security; Growing hierarchical self organizing map; Intrusion detection; Self organizing map

Indexed keywords

COMPUTER SECURITY; DATA MINING TECHNIQUES; EMPIRICAL RESULTS; FALSE ALARMS; FALSE POSITIVE; GROWING HIERARCHICAL SELF-ORGANIZING MAPS; INTRUSION DATA; ITS ARCHITECTURE; MAKING DECISION; NETWORK ADMINISTRATOR; NETWORK INTRUSION DETECTION SYSTEMS; REAL-WORLD; UNSUPERVISED TRAINING;

EID: 77649235431     PISSN: 13867857     EISSN: 15737543     Source Type: Journal    
DOI: 10.1007/s10586-009-0096-9     Document Type: Article
Times cited : (21)

References (15)
  • 1
    • 0036079912 scopus 로고    scopus 로고
    • Alert correlation in a cooperative intrusion detection framework
    • Toulouse, France
    • Cuppens, F., Miege, A.: Alert correlation in a cooperative intrusion detection framework. In: Proc. 23rd IEEE Symposium on Security and Privacy, pp. 202-215. Toulouse, France (2002).
    • (2002) Proc. 23rd IEEE Symposium on Security and Privacy , pp. 202-215
    • Cuppens, F.1    Miege, A.2
  • 7
    • 33750339375 scopus 로고    scopus 로고
    • Using alert verification to identify successful intrusion attempts
    • Kruegel, C., Robertson, W., Vigna, G.: Using alert verification to identify successful intrusion attempts. Pract. Inf. Process. Commun. 27(4), 220-228 (2004).
    • (2004) Pract. Inf. Process. Commun. , vol.27 , Issue.4 , pp. 220-228
    • Kruegel, C.1    Robertson, W.2    Vigna, G.3
  • 11
    • 30044436961 scopus 로고    scopus 로고
    • A new approach to hierarchical clustering and structuring of data with self-organizing maps
    • Pampalk, E., Widmer, G., Chan, A.: A new approach to hierarchical clustering and structuring of data with self-organizing maps. Intell. Data Analysis J. 8(2), 131-149 (2003).
    • (2003) Intell. Data Analysis J. , vol.8 , Issue.2 , pp. 131-149
    • Pampalk, E.1    Widmer, G.2    Chan, A.3
  • 12
    • 77649234461 scopus 로고    scopus 로고
    • Baseline analysis of security data
    • Rachman, O.: Baseline analysis of security data. Securimine Software Inc. (2005). www. securimine. com.
    • (2005) Securimine Software Inc.
    • Rachman, O.1
  • 13
    • 0036859375 scopus 로고    scopus 로고
    • The growing hierarchical self-organizing map: Exploratory analysis of high-dimensional data
    • Rauber, A., Merkl, D., Dittenbach, M.: The growing hierarchical self-organizing map: exploratory analysis of high-dimensional data. IEEE Trans. Neural Netw. 13(6), 1331-1341 (2002).
    • (2002) IEEE Trans. Neural Netw. , vol.13 , Issue.6 , pp. 1331-1341
    • Rauber, A.1    Merkl, D.2    Dittenbach, M.3
  • 14
    • 63149113012 scopus 로고    scopus 로고
    • Correlating intrusion alerts into attack scenarios based on improved evolving self-organizing maps
    • Xiao, Y., Han, C.: Correlating intrusion alerts into attack scenarios based on improved evolving self-organizing maps. Int. J. Comput. Sci. Netw. Secur. 6(6), 199-203 (2006).
    • (2006) Int. J. Comput. Sci. Netw. Secur. , vol.6 , Issue.6 , pp. 199-203
    • Xiao, Y.1    Han, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.