메뉴 건너뛰기




Volumn 11, Issue 5, 2014, Pages

Strategy to reduce false alarms in intrusion detection and prevention systems

Author keywords

Anomaly detection; Information security; Intrusion detection; Intrusion prevention; Risk analysis

Indexed keywords


EID: 84903954065     PISSN: 16833198     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (12)

References (15)
  • 1
    • 70849118379 scopus 로고    scopus 로고
    • RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks
    • Amin S., Siddiqui M., Hong C., and Lee S., "RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks, " Journal of Sensors, vol. 9, no. 5, pp. 3447-3468, 2009.
    • (2009) Journal of Sensors , vol.9 , Issue.5 , pp. 3447-3468
    • Amin, S.1    Siddiqui, M.2    Hong, C.3    Lee, S.4
  • 3
    • 78651583709 scopus 로고    scopus 로고
    • Agent IDS based on Misuse Approach
    • Barika S., Kadhi M., and Ghédira C., "Agent IDS based on Misuse Approach, " Journal of Software, vol. 4, pp. 495-507, 2009.
    • (2009) Journal of Software , vol.4 , pp. 495-507
    • Barika, S.1    Kadhi, M.2    Ghédira, C.3
  • 4
    • 84903941214 scopus 로고    scopus 로고
    • Next-Generation Misuse and Anomaly Prevention System
    • In edited by Joaquim Filipe and José Cordeiro,: Springer BerlinHeidelberg
    • Bringas A., García P., and Penya Y., "Next-Generation Misuse and Anomaly Prevention System, " In Enterprise Information Systems, edited by Joaquim Filipe and José Cordeiro, pp. 117-129: Springer BerlinHeidelberg. 2008.
    • (2008) Enterprise Information Systems , pp. 117-129
    • Bringas, A.1    García, P.2    Penya, Y.3
  • 5
    • 84904023460 scopus 로고    scopus 로고
    • Available at, (accessed at: 16 October 2009)
    • Chichakli R., "Information Systems Risk Management, " Available at: http: //www.iscpa.com/Risk_Management.htm (accessed at: 16 October 2009).
    • Information Systems Risk Management
    • Chichakli, R.1
  • 6
    • 42449088961 scopus 로고    scopus 로고
    • A survey of Autonomic Computing-Degrees, Models, and Applications
    • Huebscher M. and Julie A., "A survey of Autonomic Computing-Degrees, Models, and Applications. " ACM Computing Surveys, vol. 40, no. 3. 2008.
    • (2008) ACM Computing Surveys , vol.40 , Issue.3
    • Huebscher, M.1    Julie, A.2
  • 8
    • 77649235431 scopus 로고    scopus 로고
    • Filtering intrusion detection alarms
    • Mansour N., Chehab I., and Faour A., "Filtering intrusion detection alarms, " Springer Netherlands, vol 13, no 1, pp 19-29, 2010.
    • (2010) Springer Netherlands , vol.13 , Issue.1 , pp. 19-29
    • Mansour, N.1    Chehab, I.2    Faour, A.3
  • 10
    • 83255163262 scopus 로고    scopus 로고
    • Intelligent Multi-Agent Based Multivariate Statistical Framework for Database Intrusion Prevention System
    • Ramasubramanian P. and Kannan A., "Intelligent Multi-Agent Based Multivariate Statistical Framework for Database Intrusion Prevention System, " The International Arab Journal of Information Technology, vol. 2, no. 3, 2005.
    • (2005) The International Arab Journal of Information Technology , vol.2 , Issue.3
    • Ramasubramanian, P.1    Kannan, A.2
  • 12
    • 77950949554 scopus 로고    scopus 로고
    • Reducing false positives in intrusion detection systems
    • Elsevier
    • Spathoulas G. and Katsikas S., "Reducing false positives in intrusion detection systems, " Journal of computer & security, Elsevier, pp. 1-10, 2009.
    • (2009) Journal of computer & security , pp. 1-10
    • Spathoulas, G.1    Katsikas, S.2
  • 14
    • 79951742289 scopus 로고    scopus 로고
    • Principles of Information Security
    • Boston, MA, United States
    • Whitman M. and Mattord H., "Principles of Information Security, " Thomson Course Technology, Boston, MA, United States, 2005.
    • (2005) Thomson Course Technology
    • Whitman, M.1    Mattord, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.