메뉴 건너뛰기




Volumn , Issue , 2010, Pages 785-790

Alerts analysis and visualization in network-based intrusion detection systems

Author keywords

Clustering; Flocking; Intrusion detection; Visulization

Indexed keywords

ALERT DATA; CLUSTERING; CLUSTERING PROCESS; END USERS; FLOCKING; MULTI-STAGE ATTACK; NETWORK ADMINISTRATOR; NETWORK BASED INTRUSION DETECTION SYSTEMS; NETWORK TOPOLOGY; SHORT TIME FRAMES; THIRD COMPONENT; VISUAL MAPPING; VISULIZATION;

EID: 78649257208     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SocialCom.2010.120     Document Type: Conference Paper
Times cited : (9)

References (20)
  • 8
    • 26844574201 scopus 로고    scopus 로고
    • Applying data mining to intrusion detection: The quest for automation, efficiency, and credibility
    • December
    • Wenke Lee, Applying data mining to intrusion detection: the quest for automation, efficiency, and credibility, ACM SIGKDD Explorations Newsletter, December, 2002.
    • (2002) ACM SIGKDD Explorations Newsletter
    • Lee, W.1
  • 12
    • 78649305211 scopus 로고    scopus 로고
    • The snort. http://www.snort.org.
  • 15
    • 3142623031 scopus 로고    scopus 로고
    • Clustering intrusion detection alarms to support root cause analysis
    • Klaus Juslich.Clustering intrusion detection alarms to support root cause analysis. ACM Transactions on Information and System Security, vol. 6, pp. 443-471, 2002.
    • (2002) ACM Transactions on Information and System Security , vol.6 , pp. 443-471
    • Juslich, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.