메뉴 건너뛰기




Volumn 8, Issue 2, 2011, Pages 282-294

Online intrusion alert aggregation with generative data stream modeling

Author keywords

alert aggregation; data stream algorithm; generative modeling; Intrusion detection

Indexed keywords

COMPUTER CRIME; COMPUTER SYSTEM FIREWALLS; MAXIMUM LIKELIHOOD ESTIMATION;

EID: 78751674819     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2009.36     Document Type: Article
Times cited : (48)

References (44)
  • 1
    • 0003516333 scopus 로고    scopus 로고
    • Intrusion detection systems: A survey and taxonomy
    • Dept. of Computer Eng., Chalmers Univ. of Technology
    • S. Axelsson, "Intrusion Detection Systems: A Survey and Taxonomy," Technical Report 99-15, Dept. of Computer Eng., Chalmers Univ. of Technology, 2000.
    • (2000) Technical Report 99-15
    • Axelsson, S.1
  • 2
    • 0001907993 scopus 로고    scopus 로고
    • Theoretical underpinnings of situation awareness: A critical review
    • M.R. Endsley and D.J. Garland, eds., chapter 1, Lawrence Erlbaum Assoc.
    • M.R. Endsley, "Theoretical Underpinnings of Situation Awareness: A Critical Review," Situation Awareness Analysis and Measurement, M.R. Endsley and D.J. Garland, eds., chapter 1, pp. 3-32, Lawrence Erlbaum Assoc., 2000.
    • (2000) Situation Awareness Analysis and Measurement , pp. 3-32
    • Endsley, M.R.1
  • 5
    • 48049099857 scopus 로고    scopus 로고
    • Intrusion detection systems: Perspective
    • Gartner, Inc.
    • A. Allen, "Intrusion Detection Systems: Perspective," Technical Report DPRO-95367, Gartner, Inc., 2003.
    • (2003) Technical Report DPRO-95367
    • Allen, A.1
  • 7
    • 0242529344 scopus 로고    scopus 로고
    • Aggregation and correlation of intrusion-detection alerts
    • W. Lee L. Me, and A. Wespi, eds., Springer
    • H. Debar and A. Wespi, "Aggregation and Correlation of Intrusion-Detection Alerts," Recent Advances in Intrusion Detection, W. Lee, L. Me, and A. Wespi, eds., pp. 85-103, Springer, 2001.
    • (2001) Recent Advances in Intrusion Detection , pp. 85-103
    • Debar, H.1    Wespi, A.2
  • 10
    • 0037952266 scopus 로고    scopus 로고
    • Probabilistic alert correlation
    • W. Lee L. Me, and A. Wespi, eds., Springer
    • A. Valdes and K. Skinner, "Probabilistic Alert Correlation," Recent Advances in Intrusion Detection, W. Lee, L. Me, and A. Wespi, eds. pp. 54-68, Springer, 2001.
    • (2001) Recent Advances in Intrusion Detection , pp. 54-68
    • Valdes, A.1    Skinner, K.2
  • 13
    • 78751656783 scopus 로고    scopus 로고
    • Using an intrusion detection alert similarity operator to aggregate and fuse alerts
    • F. Autrel and F. Cuppens, "Using an Intrusion Detection Alert Similarity Operator to Aggregate and Fuse Alerts," Proc. Fourth Conf. Security and Network Architectures, pp. 312-322, 2005.
    • (2005) Proc. Fourth Conf. Security and Network Architectures , pp. 312-322
    • Autrel, F.1    Cuppens, F.2
  • 14
    • 26944446508 scopus 로고    scopus 로고
    • Alarm clustering for intrusion detection systems in computer networks
    • P. Perner and A. Imiya, eds. Springer
    • G. Giacinto, R. Perdisci, and F. Roli, "Alarm Clustering for Intrusion Detection Systems in Computer Networks," Machine Learning and Data Mining in Pattern Recognition, P. Perner and A. Imiya, eds. pp. 184-193, Springer, 2005.
    • (2005) Machine Learning and Data Mining in Pattern Recognition , pp. 184-193
    • Giacinto, G.1    Perdisci, R.2    Roli, F.3
  • 17
    • 84944201343 scopus 로고    scopus 로고
    • LAMBDA: A language to model a database for detection of attacks
    • H. Debar L. Me, and S.F. Wu, eds. Springer
    • F. Cuppens and R. Ortalo, "LAMBDA: A Language to Model a Database for Detection of Attacks," Recent Advances in Intrusion Detection, H. Debar, L. Me, and S.F. Wu, eds. pp. 197-216, Springer, 2000.
    • (2000) Recent Advances in Intrusion Detection , pp. 197-216
    • Cuppens, F.1    Ortalo, R.2
  • 18
    • 0036090387 scopus 로고    scopus 로고
    • STATL: An attack language for state-based intrusion detection
    • S.T. Eckmann, G. Vigna, and R.A. Kemmerer, "STATL: An Attack Language for State-Based Intrusion Detection," J. Computer Security, vol. 10, nos. 1/2, pp. 71-103, 2002.
    • (2002) J. Computer Security , vol.10 , Issue.1-2 , pp. 71-103
    • Eckmann, S.T.1    Vigna, G.2    Kemmerer, R.A.3
  • 20
    • 21144437229 scopus 로고    scopus 로고
    • Applying data mining techniques to analyze alert data
    • X. Zhou, Y. Zhang, and M.E. Orlowska, eds. Springer
    • M.S. Shin, H. Moon, K.H. Ryu, K. Kim, and J. Kim, "Applying Data Mining Techniques to Analyze Alert Data," Web Technologies and Applications, X. Zhou, Y. Zhang, and M.E. Orlowska, eds. pp. 193-200, Springer, 2003.
    • (2003) Web Technologies and Applications , pp. 193-200
    • Shin, M.S.1    Moon, H.2    Ryu, K.H.3    Kim, K.4    Kim, J.5
  • 22
    • 44649096422 scopus 로고    scopus 로고
    • Using unsupervised learning for network alert correlation
    • R. Goebel, J. Siekmann, and W. Wahlster, eds. Springer
    • R. Smith, N. Japkowicz, M. Dondo, and P. Mason, "Using Unsupervised Learning for Network Alert Correlation," Advances in Artificial Intelligence, R. Goebel, J. Siekmann, and W. Wahlster, eds. pp. 308-319, Springer, 2008.
    • (2008) Advances in Artificial Intelligence , pp. 308-319
    • Smith, R.1    Japkowicz, N.2    Dondo, M.3    Mason, P.4
  • 28
    • 33745469440 scopus 로고    scopus 로고
    • May
    • IANA, "Port Numbers," http://www.iana.org/assignments/ port-numbers, May 2009.
    • (2009) Port Numbers
  • 34
    • 84941155240 scopus 로고
    • Well separated clusters and optimal fuzzy partitions
    • J.C. Dunn, "Well Separated Clusters and Optimal Fuzzy Partitions," J. Cybernetics, vol. 4, pp. 95-104, 1974.
    • (1974) J. Cybernetics , vol.4 , pp. 95-104
    • Dunn, J.C.1
  • 36
    • 0242635232 scopus 로고    scopus 로고
    • Clustering validity assessment using multi representatives
    • M. Halkidi and M. Vazirgiannis, "Clustering Validity Assessment Using Multi Representatives," Proc. SETN Conf., vol. 2, pp. 237- 249, 2002.
    • (2002) Proc. SETN Conf. , vol.2 , pp. 237-249
    • Halkidi, M.1    Vazirgiannis, M.2
  • 38
    • 85101511266 scopus 로고    scopus 로고
    • Analysis and visualization of classifier performance: Comparison under imprecise class and cost distributions
    • F. Provost and T. Fawcett, "Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Distributions," Proc. Third Int'l Conf. Knowledge Discovery and Data Mining (KDD '97), pp. 43-48, 1997.
    • (1997) Proc. Third Int'l Conf. Knowledge Discovery and Data Mining (KDD '97) , pp. 43-48
    • Provost, F.1    Fawcett, T.2
  • 39
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory
    • J. McHugh, "Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory," ACM Trans. Information and System Security, vol. 3, no. 4, pp. 262-294, 2000.
    • (2000) ACM Trans. Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 40
    • 35248857893 scopus 로고    scopus 로고
    • An analysis of the 1999 DARPA/ Lincoln laboratory evaluation data for network anomaly detection
    • G. Vigna, E. Jonsson, and C. Krügel, eds. Springer
    • M.V. Mahoney and P.K. Chan, "An Analysis of the 1999 DARPA/ Lincoln Laboratory Evaluation Data for Network Anomaly Detection," Recent Advances in Intrusion Detection, G. Vigna, E. Jonsson, and C. Krügel, eds., pp. 220-237, Springer, 2003.
    • (2003) Recent Advances in Intrusion Detection , pp. 220-237
    • Mahoney, M.V.1    Chan, P.K.2
  • 42
    • 78751662425 scopus 로고    scopus 로고
    • Sourcefire Inc.
    • Sourcefire, Inc., http://www.snort.org/, 2009.
    • (2009)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.