Real-time alert correlation with type graphs
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in an understandable way. Several algorithms exist for this purpose which use attack graphs to model the ways in which att...
| Main Authors: | Tedesco, Gianni, Aickelin, Uwe |
|---|---|
| Other Authors: | Sekar, R |
| Format: | Book Section |
| Published: |
Springer
2008
|
| Online Access: | https://eprints.nottingham.ac.uk/1285/ |
Similar Items
Data Reduction in Intrusion Alert Correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Strategic Alert Throttling for Intrusion Detection Systems
by: Tedesco, Gianni, et al.
Published: (2005)
by: Tedesco, Gianni, et al.
Published: (2005)
Strategic Alert Throttling for Intrusion Detection Systems
by: Tedesco, Gianni, et al.
Published: (2005)
by: Tedesco, Gianni, et al.
Published: (2005)
Adaptive alert throttling for intrusion detection systems
by: Tedesco, Gianni, et al.
Published: (2003)
by: Tedesco, Gianni, et al.
Published: (2003)
An Immune Network Intrusion Detection System Utilising Correlation Context
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
An immune inspired Network Intrusion Detection System utilising correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2007)
by: Greensmith, Julie, et al.
Published: (2007)
Integrating Innate and Adaptive Immunity for Intrusion Detection
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
An effective security alert mechanism for real-time phishing tweet detection on twitter
by: Mohd Sani, Nor Fazlida, et al.
Published: (2019)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2019)
Alert Correlation Technique Analysis For Diverse Log
by: Yusof, R., et al.
Published: (2008)
by: Yusof, R., et al.
Published: (2008)
Network intrusion alert correlation challenges and techniques
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
Enhanced Alert Correlation Framework for Heterogeneous Log
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Dendritic Cells for Real-Time Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Real time server alert system using port scanning and reachability test functions
by: Muhammad Hafiz, Muhamad Hendri
Published: (2013)
by: Muhammad Hafiz, Muhamad Hendri
Published: (2013)
Intrusion Alert Correlation Technique Analysis for Heterogeneous Log
by: Yusof, R., et al.
Published: (2008)
by: Yusof, R., et al.
Published: (2008)
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
Integrating real-time analysis with the dendritic cell algorithm through segmentation
by: Gu, Feng, et al.
Published: (2009)
by: Gu, Feng, et al.
Published: (2009)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Intrusion Alert Quality Framework For
Security False Alert Reduction
by: Abu Bakar, Najwa
Published: (2007)
by: Abu Bakar, Najwa
Published: (2007)
Detecting Botnets Through Log Correlation
by: Al-Hammadi, Yousof, et al.
Published: (2006)
by: Al-Hammadi, Yousof, et al.
Published: (2006)
Industrial Bioprocessing Alert
by: Shaari , N.
Published: (2008)
by: Shaari , N.
Published: (2008)
Implications of some types of pairwise closed graphs
by: Bouseliana, Hend, et al.
Published: (2022)
by: Bouseliana, Hend, et al.
Published: (2022)
Behavioural correlation for detecting P2P bots
by: Al-Hammadi, Yousof, et al.
Published: (2010)
by: Al-Hammadi, Yousof, et al.
Published: (2010)
Flood monitoring and alert system
by: Kok, How Meng
Published: (2024)
by: Kok, How Meng
Published: (2024)
Experts: be on alert no matter what
by: The Star
Published: (2021)
by: The Star
Published: (2021)
Be alert against new variant
by: Pfordten, Diyana
Published: (2021)
by: Pfordten, Diyana
Published: (2021)
A real-time hybrid correlator for synthetic aperture radar signal processing
by: Koo, V. C., et al.
Published: (2007)
by: Koo, V. C., et al.
Published: (2007)
Real time cross correlator for speed measurement of particle conveying in pneumatic pipeline
by: Rahmat, Mohd Fua’ad, et al.
Published: (2000)
by: Rahmat, Mohd Fua’ad, et al.
Published: (2000)
Survivin expression in colorectal: real time
polymerase chain reaction and correlation with
clinicopathological features
by: Said Saleh,, et al.
Published: (2014)
by: Said Saleh,, et al.
Published: (2014)
Smart steering auto alert system
by: Abdul Muin, Mohd Fahmi, et al.
Published: (2018)
by: Abdul Muin, Mohd Fahmi, et al.
Published: (2018)
The Global Outbreak Alert and Response Network
by: Mackenzie, John, et al.
Published: (2014)
by: Mackenzie, John, et al.
Published: (2014)
Temperature alert alarm system (TAAS)
by: Norhidayah, Masstor
Published: (2015)
by: Norhidayah, Masstor
Published: (2015)
Assignment box alert for student (ABA)
by: Azizul, Aziz
Published: (2011)
by: Azizul, Aziz
Published: (2011)
Crowd alert board for deterring overcrowding
by: Jing Yu, Chong, et al.
Published: (2021)
by: Jing Yu, Chong, et al.
Published: (2021)
UNIMAS Central Monitoring And Alerting System
by: Harun, Maksom, et al.
Published: (2014)
by: Harun, Maksom, et al.
Published: (2014)
Security alert through path analysis
by: Lo, Kelvin, Yir Siang
Published: (2013)
by: Lo, Kelvin, Yir Siang
Published: (2013)
Network intrusion detection and alert system
by: To, Jin Yi
Published: (2024)
by: To, Jin Yi
Published: (2024)
People must remain on high alert
by: Ashley, Tang
Published: (2021)
by: Ashley, Tang
Published: (2021)
Characterize type of splicing languages via directed splicing graph
by: Nooradelena, Mohd Ruslim, et al.
Published: (2025)
by: Nooradelena, Mohd Ruslim, et al.
Published: (2025)
Similar Items
-
Data Reduction in Intrusion Alert Correlation
by: Tedesco, Gianni, et al.
Published: (2006) -
Strategic Alert Throttling for Intrusion Detection Systems
by: Tedesco, Gianni, et al.
Published: (2005) -
Strategic Alert Throttling for Intrusion Detection Systems
by: Tedesco, Gianni, et al.
Published: (2005) -
Adaptive alert throttling for intrusion detection systems
by: Tedesco, Gianni, et al.
Published: (2003) -
An Immune Network Intrusion Detection System Utilising Correlation Context
by: Tedesco, Gianni, et al.
Published: (2006)