메뉴 건너뛰기




Volumn 4, Issue 3, 2012, Pages 181-195

Alert correlation using artificial immune recognition system

Author keywords

AIRS; Alert correlation; Artificial immune recognition system; IDS; Intrusion detection system

Indexed keywords

AIR; COMPUTER CRIME; DATA MINING; GRAPH ALGORITHMS; INTRUSION DETECTION; NETWORK SECURITY;

EID: 84862181192     PISSN: 17580366     EISSN: 17580374     Source Type: Journal    
DOI: 10.1504/IJBIC.2012.047240     Document Type: Article
Times cited : (8)

References (35)
  • 5
    • 0037856497 scopus 로고    scopus 로고
    • The clonal selection algorithm with engineering applications
    • De Castro, L. and Von Zuben, F. (2000) 'The clonal selection algorithm with engineering applications', in GECCO 2000, pp.36-39.
    • (2000) GECCO 2000 , pp. 36-39
    • De Castro, L.1    Von Zuben, F.2
  • 6
    • 0036090387 scopus 로고    scopus 로고
    • STATL: An attack language for state-based intrusion detection
    • Eckmann, ST., Vigna, G. and Kemmerer, RA. (2002) 'Statl: an attack language for state-based intrusion detection', J. Comput. Secur., Vol. 10, Nos. 1-2, pp.71-103. (Pubitemid 34531413)
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 71-103
    • Eckmann, S.T.1    Vigna, G.2    Kemmerer, R.A.3
  • 9
    • 26944469543 scopus 로고    scopus 로고
    • Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection
    • Artificial Immune Systems: 4th International Conference, ICARIS 2005. Proceedings
    • Greensmith, J., Aickelin, U. and Cayzer, S. (2005) 'Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection', in Artificial Immune Systems, Lecture Notes in Computer Science, Springer Berlin/Heidelberg, Vol. 3627, pp.153-167. (Pubitemid 41472720)
    • (2005) Lecture Notes in Computer Science , vol.3627 , pp. 153-167
    • Greensmith, J.1    Aickelin, U.2    Cayzer, S.3
  • 11
    • 84862178933 scopus 로고    scopus 로고
    • netForensics Honeynet team (accessed on 1 April 2012)
    • netForensics Honeynet team (2005) 'Honeynet traffic logs', available at http://old.honeynet.org/scans/scan34 (accessed on 1 April 2012).
    • (2005) Honeynet Traffic Logs
  • 13
    • 3142623031 scopus 로고    scopus 로고
    • Clustering intrusion detection alarms to support root cause analysis
    • Julisch, K. (2003) 'Clustering intrusion detection alarms to support root cause analysis', ACM Trans. Inform. Syst. Secur, Vol. 6, pp.443-471.
    • (2003) ACM Trans. Inform. Syst. Secur , vol.6 , pp. 443-471
    • Julisch, K.1
  • 15
    • 66449085932 scopus 로고    scopus 로고
    • Reducing false positives in anomaly detectors through fuzzy alert aggregation
    • Maggia, F., Matteucci, M. and Zanero, S. (2009) 'Reducing false positives in anomaly detectors through fuzzy alert aggregation', Inform. Fusion, Vol. 10, No. 4, pp.300-311.
    • (2009) Inform. Fusion , vol.10 , Issue.4 , pp. 300-311
    • Maggia, F.1    Matteucci, M.2    Zanero, S.3
  • 19
    • 84862221978 scopus 로고    scopus 로고
    • NCSUCD Lab (accessed on 1 April 2012)
    • NCSUCD Lab (2004) 'Tiaa: a toolkit for intrusion alert analysis', available at http://discovery.csc.ncsu.edu/software/correlator/ver0.4/index.html (accessed on 1 April 2012).
    • (2004) Tiaa: A Toolkit for Intrusion Alert Analysis
  • 25
    • 63049125148 scopus 로고    scopus 로고
    • An incremental frequent structure mining framework for real-time alert correlation
    • Sadoddin, R. and Ghorbani, A. (2009) 'An incremental frequent structure mining framework for real-time alert correlation', Comput. Secur, Vol. 28, Nos. 3-4, pp.153-173.
    • (2009) Comput. Secur , vol.28 , Issue.3-4 , pp. 153-173
    • Sadoddin, R.1    Ghorbani, A.2
  • 29
    • 84947603083 scopus 로고    scopus 로고
    • Probabilistic alert correlation
    • Recent Advances in Intrusion Detection
    • Valdes, A. and Skinner, K. (2001) 'Probabilistic alert correlation', in Recent Advances in Intrusion Detection, Vol. 2212, pp.54-68. (Pubitemid 33352000)
    • (2001) Lecture Notes in Computer Science , Issue.2212 , pp. 54-68
    • Valdes, A.1    Skinner, K.2
  • 31
    • 67349164787 scopus 로고    scopus 로고
    • Processing intrusion detection alert aggregates with time series modeling
    • Inform Fusion DOI 10.1016/j.inffus.2009.01.003
    • Viinikka, J., Debar, H., Lehikoinen, A. and Tarvainen, M. (2009) 'Processing intrusion detection alert aggregates with time series modeling', Inform Fusion DOI 10.1016/j.inffus.2009.01.003, Special Issue on Information Fusion in Computer Security, Vol. 10, No. 4, pp.312-324.
    • (2009) Special Issue on Information Fusion in Computer Security , vol.10 , Issue.4 , pp. 312-324
    • Viinikka, J.1    Debar, H.2    Lehikoinen, A.3    Tarvainen, M.4
  • 32
    • 79959289473 scopus 로고    scopus 로고
    • Automatic multi-step attack pattern discovering
    • Wang, L., Ghorbani, A. and Li, Y. (2010) 'Automatic multi-step attack pattern discovering', Int. J. Netw. Secur, Vol. 10, No. 2, pp.142-152.
    • (2010) Int. J. Netw. Secur , vol.10 , Issue.2 , pp. 142-152
    • Wang, L.1    Ghorbani, A.2    Li, Y.3
  • 33
    • 3543121725 scopus 로고    scopus 로고
    • Artificial immune recognition system (airs): An immune-inspired supervised learning algorithm
    • Watkins, A., Timmis, J. and Boggess, L. (2004) 'Artificial immune recognition system (airs): an immune-inspired supervised learning algorithm', Genetic Programming and Evolvable Machines, Vol. 5, No. 3, pp.291-317.
    • (2004) Genetic Programming and Evolvable Machines , vol.5 , Issue.3 , pp. 291-317
    • Watkins, A.1    Timmis, J.2    Boggess, L.3
  • 35
    • 38149027709 scopus 로고    scopus 로고
    • Alert correlation for extracting attack strategies
    • Zhu, B. and Ghorbani, A. (2006) 'Alert correlation for extracting attack strategies', Int. J. Netw. Secur, Vol. 3, No. 3, pp.244-258.
    • (2006) Int. J. Netw. Secur , vol.3 , Issue.3 , pp. 244-258
    • Zhu, B.1    Ghorbani, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.