메뉴 건너뛰기




Volumn 11, Issue 7, 2011, Pages 4349-4365

Alert correlation in collaborative intelligent intrusion detection systems - A survey

Author keywords

Alert correlation; Collaborative intrusion detection; Computational intelligence approaches; False positive analysis

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER CRIME; DAMAGE DETECTION; DISTRIBUTED COMPUTER SYSTEMS; FUZZY LOGIC; SOFT COMPUTING;

EID: 79960556588     PISSN: 15684946     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.asoc.2010.12.004     Document Type: Article
Times cited : (128)

References (71)
  • 1
    • 58149488644 scopus 로고    scopus 로고
    • Intrusion detection alarms reduction using root cause analysis and clustering
    • S.O. Al-Mamory, and H. Zhang Intrusion detection alarms reduction using root cause analysis and clustering Computer Communications 32 2009 419 430
    • (2009) Computer Communications , vol.32 , pp. 419-430
    • Al-Mamory, S.O.1    Zhang, H.2
  • 3
    • 62249168871 scopus 로고    scopus 로고
    • A hybrid intrusion detection system design for computer network security
    • M.A. Aydin, A.H. Zaim, and K.G. Ceylan A hybrid intrusion detection system design for computer network security Computers and Electrical Engineering 35 2009 517 526
    • (2009) Computers and Electrical Engineering , vol.35 , pp. 517-526
    • Aydin, M.A.1    Zaim, A.H.2    Ceylan, K.G.3
  • 12
    • 84947561772 scopus 로고    scopus 로고
    • Aggregation and Correlation of Intrusion-Detection Alerts
    • Recent Advances in Intrusion Detection
    • H. Debar, and A. Wespi Aggregation and correlation of intrusion-detection alerts Proceedings of the 4th International Symposium on Recent Advances in Intrusion detection (RAID) 2001 Springer Verlag California, USA 85 103 (Pubitemid 33352002)
    • (2001) Lect. Notes Comput. Sci. , Issue.2212 , pp. 85-103
    • Debar, H.1    Wespi, A.2
  • 13
    • 25844491810 scopus 로고    scopus 로고
    • An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
    • DOI 10.1016/j.eswa.2005.05.002, PII S0957417405000989
    • O. Depren, M. Topallar, E. Anarim, and M.K. Ciliz An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks Expert Systems with Applications 29 2005 713 722 (Pubitemid 41394445)
    • (2005) Expert Systems with Applications , vol.29 , Issue.4 , pp. 713-722
    • Depren, O.1    Topallar, M.2    Anarim, E.3    Ciliz, M.K.4
  • 14
    • 68949196337 scopus 로고    scopus 로고
    • A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
    • X.D. Hoang, J. Hu, and P. Bertok A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference Journal of Network and Computer Applications 32 2009 1219 1228
    • (2009) Journal of Network and Computer Applications , vol.32 , pp. 1219-1228
    • Hoang, X.D.1    Hu, J.2    Bertok, P.3
  • 15
    • 33847617890 scopus 로고    scopus 로고
    • Intrusion Detection Aware Component-based Systems: A Specification-based Framework
    • School of Computing, Queen's University, Kingston, Ont., Canada K7L 3N6, 27
    • M. Hussein, M. Zulkernine, Intrusion detection aware component-based systems: a specification-based framework, School of Computing, Queen's University, Kingston, Ont., Canada K7L 3N6, 27, The Journal of Systems and Software 80 (2007) 700-710.
    • (2007) The Journal of Systems and Software , vol.80 , pp. 700-710
    • Hussein, M.1    Zulkernine, M.2
  • 17
  • 18
    • 67349095739 scopus 로고    scopus 로고
    • A decision support system for constructing an alert classification model
    • N.Y. Jan, S.C. Lin, S.S. Tseng, and N.P. Lin A decision support system for constructing an alert classification model Expert Systems with Applications 36 2009 11145 11155
    • (2009) Expert Systems with Applications , vol.36 , pp. 11145-11155
    • Jan, N.Y.1    Lin, S.C.2    Tseng, S.S.3    Lin, N.P.4
  • 24
    • 66449085932 scopus 로고    scopus 로고
    • Reducing false positives in anomaly detectors through fuzzy alert aggregation
    • F. Maggi, M. Matteucci, and S. Zanero Reducing false positives in anomaly detectors through fuzzy alert aggregation Information Fusion 10 2009 300 311
    • (2009) Information Fusion , vol.10 , pp. 300-311
    • Maggi, F.1    Matteucci, M.2    Zanero, S.3
  • 28
    • 67349242974 scopus 로고    scopus 로고
    • A logic-based model to support alert correlation in intrusion detection
    • B. Morin, L. M, H. Debar, M. Ducass, A logic-based model to support alert correlation in intrusion detection, Information Fusion 10 (2009) 285-299.
    • (2009) Information Fusion , vol.10 , pp. 285-299
    • Morin, B.1    M, L.2    Debar, H.3    Ducass, M.4
  • 30
    • 4243538338 scopus 로고    scopus 로고
    • Adapting query optimization techniques for efficient intrusion alert correlation
    • NCSU, Department of Computer Science
    • P. Ning, D. Xu, Adapting query optimization techniques for efficient intrusion alert correlation, Technical report, NCSU, Department of Computer Science, 2002.
    • (2002) Technical Report
    • Ning, P.1    Xu, D.2
  • 31
    • 1642351593 scopus 로고    scopus 로고
    • An Intrusion Alert Correlator based on Prerequisites of Intrusions
    • North Carolina State University, Department of Computer Science
    • P. Ning, D.S. Reeves, Y. Cui, An Intrusion Alert Correlator based on Prerequisites of Intrusions, Technical Report TR-2002-01, North Carolina State University, Department of Computer Science, 2002.
    • (2002) Technical Report TR-2002-01
    • Ning, P.1    Reeves, D.S.2    Cui, Y.3
  • 38
    • 14544283296 scopus 로고    scopus 로고
    • Hypothesizing and reasoning about attacks missed by intrusion detection systems
    • DOI 10.1145/1042031.1042036
    • P. Ning, and D. Xu Hypothesizing and reasoning about attacks missed by intrusion detection systems ACM Transactions on Information and System Security 7 4 2004 591 627 (Pubitemid 40302700)
    • (2004) ACM Transactions on Information and System Security , vol.7 , Issue.4 , pp. 591-627
    • Ning, P.1    Xu, D.2
  • 39
    • 21644481812 scopus 로고    scopus 로고
    • Correlating intrusion events and building attack scenarios through attack graph distances
    • Proceedings - 20th Annual Computer Security Applications Conference, ACSAC 2004
    • S. Noel, E. Robertson, and S. Jajodia Correlating intrusion events and building attack scenarios through attack graph distances 20th Annual Computer Security Applications Conference (ACSAC'04) 2004 350 359 (Pubitemid 40931090)
    • (2004) Proceedings - Annual Computer Security Applications Conference, ACSAC , pp. 350-359
    • Noel, S.1    Robertson, E.2    Jajodia, S.3
  • 40
    • 33750512162 scopus 로고    scopus 로고
    • Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening
    • DOI 10.1016/j.jnca.2005.06.002, PII S1084804505000433, Network and Information Security: A Computational Intelligence Approach
    • T. Ozyer, R. Alhajj, and K. Barker Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening Journal of Network and Computer Applications 30 2007 99 113 (Pubitemid 44666485)
    • (2007) Journal of Network and Computer Applications , vol.30 , Issue.1 , pp. 99-113
    • Ozyer, T.1    Alhajj, R.2    Barker, K.3
  • 43
    • 72949099162 scopus 로고    scopus 로고
    • Intrusion detection systems
    • S. Jajodia (Series editor) Springer ISBN 978-0-387-77265-3, e-ISBN: 978-0-387-77266-0
    • R.D. Pietro, L.V. Mancini, Intrusion detection systems, in: S. Jajodia (Series editor), Handbook of Advances in Information Security, Springer, 2008, ISBN 978-0-387-77265-3, e-ISBN: 978-0-387-77266-0.
    • (2008) Handbook of Advances in Information Security
    • Pietro, R.D.1    Mancini, L.V.2
  • 45
    • 79960561513 scopus 로고    scopus 로고
    • Cooperative intrusion detection for detecting novel attacks using realtime data mining approach
    • R. Pushparaj, and S. Bhuvana Cooperative intrusion detection for detecting novel attacks using realtime data mining approach Proceedings of ICSTC 2008 110 125
    • (2008) Proceedings of ICSTC , pp. 110-125
    • Pushparaj, R.1    Bhuvana, S.2
  • 47
    • 63049125148 scopus 로고    scopus 로고
    • An incremental frequent structure mining framework for real-time alert correlation
    • R. Sadoddin, and A.A. Ghorbani An incremental frequent structure mining framework for real-time alert correlation Computers Security 28 2009 153 173
    • (2009) Computers Security , vol.28 , pp. 153-173
    • Sadoddin, R.1    Ghorbani, A.A.2
  • 48
    • 33748619234 scopus 로고    scopus 로고
    • Applying genetic algorithm for classifying anomalous TCP/IP packets
    • DOI 10.1016/j.neucom.2006.01.023, PII S0925231206000907, Brain Inspired Cognitive Systems Selected papers from the 1st International Conference on Brain Inspired Cognitive Systems (BICS 2004)
    • T. Shon, X. Kovah, and J. Moon Applying genetic algorithm for classifying anomalous TCP/IP packets Neurocomputing 69 2006 2429 2433 (Pubitemid 44375533)
    • (2006) Neurocomputing , vol.69 , Issue.16-18 , pp. 2429-2433
    • Shon, T.1    Kovah, X.2    Moon, J.3
  • 51
    • 57849130705 scopus 로고    scopus 로고
    • Anomaly-based network intrusion detection: Techniques, systems and challenges
    • P.G. Teodoro, J.D. Verdejo, G.M. Fernandez, and E. Vazquez Anomaly-based network intrusion detection: techniques, systems and challenges Computers Security 28 2009 18 28
    • (2009) Computers Security , vol.28 , pp. 18-28
    • Teodoro, P.G.1    Verdejo, J.D.2    Fernandez, G.M.3    Vazquez, E.4
  • 52
    • 69349090629 scopus 로고    scopus 로고
    • A research using hybrid RBF/Elman neural networks for intrusion detection system secure model
    • X. Tong, Z. Wang, and H. Yu A research using hybrid RBF/Elman neural networks for intrusion detection system secure model Computer Physics Communications 180 2009 1795 1801
    • (2009) Computer Physics Communications , vol.180 , pp. 1795-1801
    • Tong, X.1    Wang, Z.2    Yu, H.3
  • 53
    • 34447639073 scopus 로고    scopus 로고
    • A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers
    • DOI 10.1016/j.comcom.2007.05.002, PII S0140366407001855
    • A.N. Toosi, and M. Kahani A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers Computer Communications 30 2007 2201 2212 (Pubitemid 47094963)
    • (2007) Computer Communications , vol.30 , Issue.10 , pp. 2201-2212
    • Toosi, A.N.1    Kahani, M.2
  • 56
    • 84947603083 scopus 로고    scopus 로고
    • Probabilistic Alert Correlation
    • Recent Advances in Intrusion Detection
    • A. Valdes, and K. Skinner Probabilistic alert correlation Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001) 2001 54 68 (Pubitemid 33352000)
    • (2001) Lect. Notes Comput. Sci. , Issue.2212 , pp. 54-68
    • Valdes, A.1    Skinner, K.2
  • 58
    • 70350134739 scopus 로고    scopus 로고
    • The use of computational intelligence in intrusion detection systems: A review
    • S.X. Wu, and W. Banzhaf The use of computational intelligence in intrusion detection systems: a review Applied Soft Computing Journal 10 2010 1 35
    • (2010) Applied Soft Computing Journal , vol.10 , pp. 1-35
    • Wu, S.X.1    Banzhaf, W.2
  • 62
    • 78049324449 scopus 로고    scopus 로고
    • Correlation analysis of intrusion alerts
    • R. Di Pietro, L.V. Mancini (Eds.) Springer ISBN 978-0-387-77265-3
    • D. Xu, P. Ning, Correlation analysis of intrusion alerts, in: R. Di Pietro, L.V. Mancini (Eds.), Intrusion Detection Systems, Advances in Information Security, vol. 38, Springer, 2008, pp. 65-92, ISBN 978-0-387-77265-3.
    • (2008) Intrusion Detection Systems, Advances in Information Security , vol.38 , pp. 65-92
    • Xu, D.1    Ning, P.2
  • 63
    • 23944456320 scopus 로고    scopus 로고
    • TRINETR: An architecture for collaborative intrusion detection and knowledge-based alert evaluation
    • DOI 10.1016/j.aei.2005.05.004, PII S1474034605000340, Collaorative Environment for Design and Manufacturing
    • J. Yu, Y.V.R. Reddy, S. Selliah, S. Reddy, V. Bharadwaj, and S. Kankanahalli TRINETR: an architecture for collaborative intrusion detection and knowledge-based alert evaluation Advanced Engineering Informatics 19 2005 93 101 (Pubitemid 41203511)
    • (2005) Advanced Engineering Informatics , vol.19 , Issue.2 , pp. 93-101
    • Yu, J.1    Reddy, Y.V.R.2    Selliah, S.3    Reddy, S.4    Bharadwaj, V.5    Kankanahalli, S.6
  • 66
    • 67649509485 scopus 로고    scopus 로고
    • Decentralized multidimensional alert correlation for collaborative intrusion detection
    • C.V. Zhou, C. Leckie, and S. Karunasekera Decentralized multidimensional alert correlation for collaborative intrusion detection Journal of Network and Computer Applications 32 2009 1106 1123
    • (2009) Journal of Network and Computer Applications , vol.32 , pp. 1106-1123
    • Zhou, C.V.1    Leckie, C.2    Karunasekera, S.3
  • 67
    • 67649433210 scopus 로고    scopus 로고
    • A survey of coordinated attacks and collaborative intrusion detection
    • in press
    • C.V. Zhou, C. Leckie, S. Karunasekera, A survey of coordinated attacks and collaborative intrusion detection, Computer Security, pp. 1-17, in press.
    • Computer Security , pp. 1-17
    • Zhou, C.V.1    Leckie, C.2    Karunasekera, S.3
  • 71
    • 79960561055 scopus 로고    scopus 로고
    • Intrusion detection message exchange message format (IDMEF), 2005
    • Intrusion detection message exchange message format (IDMEF), http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml-14.txt, 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.