메뉴 건너뛰기




Volumn 29, Issue 6, 2010, Pages 712-723

A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm

Author keywords

Alarm correlation; False alarm; Intrusion Detection System; K means clustering; Self Organising Map (SOM)

Indexed keywords

ALARM CORRELATION; FALSE ALARMS; INTRUSION DETECTION SYSTEMS; K-MEANS CLUSTERING; SELF-ORGANISING MAPS;

EID: 77955430292     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2010.02.001     Document Type: Article
Times cited : (82)

References (31)
  • 1
    • 26444495635 scopus 로고    scopus 로고
    • IDS false alarm reduction using continuous and discontinuous patterns Third international conference on applied cryptography and network security
    • ACNS, New York
    • A. Alharby, and H. Imai IDS false alarm reduction using continuous and discontinuous patterns Third international conference on applied cryptography and network security, ACNS, New York, United State Lecture notes in computer science vol. 3531 2005
    • (2005) Lecture Notes in Computer Science , vol.3531
    • Alharby, A.1    Imai, H.2
  • 10
    • 0000171332 scopus 로고    scopus 로고
    • Limitations of self organizing map for vector quantization and multidimensional scaling
    • A. Flexer Limitations of self organizing map for vector quantization and multidimensional scaling M.C. Mozer, Advances in neural information processing systems vol. 9 1997 MIT Press/Bradford Books 445 451
    • (1997) Advances in Neural Information Processing Systems , vol.9 , pp. 445-451
    • Flexer, A.1
  • 13
  • 14
    • 0142095451 scopus 로고    scopus 로고
    • NSOM: A real-time network-based intrusion detection system using self-organizing maps
    • Labib K, Vemuri R. NSOM: a real-time network-based intrusion detection system using self-organizing maps. In: Networks and security; 2002.
    • (2002) Networks and Security
    • Labib, K.1    Vemuri, R.2
  • 15
    • 77955425948 scopus 로고    scopus 로고
    • IDS false alarm filtering using KNN classifier Fifth international workshop on information security applications
    • WISA, Jeju Island, South Korea
    • K.H. Law, and L.F. Kwok IDS false alarm filtering using KNN classifier Fifth international workshop on information security applications, WISA, Jeju Island, South Korea Lecture notes in com2puter science vol. 3325 2004
    • (2004) Lecture Notes in Computer Science , vol.3325
    • Law, K.H.1    Kwok, L.F.2
  • 16
  • 18
    • 0002877253 scopus 로고
    • Discovery, analysis, and presentation of strong rules
    • G. Piatetsky-Shapiro Discovery, analysis, and presentation of strong rules G. Piatetsky-Shapiro, W.J. Frawley, Knowledge discovery in databases 1991 AAAI/MIT Press Cambridge, MA
    • (1991) Knowledge Discovery in Databases
    • Piatetsky-Shapiro, G.1
  • 20
    • 26444529309 scopus 로고    scopus 로고
    • False alarm classification model for network-based intrusion detection system, intelligence data engineering and automated learning
    • M.S. Shin, E.H. Kim, and K.H. Ryu False alarm classification model for network-based intrusion detection system, intelligence data engineering and automated learning Lecture notes in computer science vol. 3177/2004 2004 259265
    • (2004) Lecture Notes in Computer Science , vol.3177 , Issue.2004 , pp. 259-265
    • Shin, M.S.1    Kim, E.H.2    Ryu, K.H.3
  • 24
    • 52149097296 scopus 로고    scopus 로고
    • The problem of false alarms: Evaluation with Snort and DARPA 1999 dataset trust, privacy and security in digital business
    • G.C. Tjhai, M. Papadaki, S.M. Furnell, and N.L. Clarke The problem of false alarms: evaluation with Snort and DARPA 1999 dataset Trust, privacy and security in digital business Lecture notes in computer science vol. 5185/2008 2008 139 150
    • (2008) Lecture Notes in Computer Science , vol.5185 , Issue.2008 , pp. 139-150
    • Tjhai, G.C.1    Papadaki, M.2    Furnell, S.M.3    Clarke, N.L.4
  • 25
    • 48249145157 scopus 로고    scopus 로고
    • Investigating the problem of IDS false alarms: An experimental study using Snort
    • Proceedings of the IFIP TC 11 23rd international information security conference
    • G.C. Tjhai, M. Papadaki, S.M. Furnell, and N.L. Clarke Investigating the problem of IDS false alarms: an experimental study using Snort Sushil Jajodia, Pierangela Samarati, Stelvio Cimato, Proceedings of the IFIP TC 11 23rd international information security conference IFIP international federation for information processing vol. 278 2008 Springer Boston 253 267
    • (2008) IFIP International Federation for Information Processing , vol.278 , pp. 253-267
    • Tjhai, G.C.1    Papadaki, M.2    Furnell, S.M.3    Clarke, N.L.4
  • 30
    • 33745165284 scopus 로고    scopus 로고
    • Analyzing TCP traffic patterns using self organizing maps
    • Proceedings 13th international conference on image analysis and processing
    • S. Zanero Analyzing TCP traffic patterns using self organizing maps Proceedings 13th international conference on image analysis and processing Lecture notes in computer science vol. 3617/2005 2005 83 90
    • (2005) Lecture Notes in Computer Science , vol.3617 , Issue.2005 , pp. 83-90
    • Zanero, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.