Data Reduction in Intrusion Alert Correlation
Network intrusion detection sensors are usually built around low level models of network traffic. This means that their output is of a similarly low level and as a consequence, is difficult to analyze. Intrusion alert correlation is the task of automating some of this analysis by grouping related al...
| Main Authors: | Tedesco, Gianni, Aickelin, Uwe |
|---|---|
| Format: | Article |
| Published: |
2006
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/365/ |
Similar Items
Adaptive alert throttling for intrusion detection systems
by: Tedesco, Gianni, et al.
Published: (2003)
by: Tedesco, Gianni, et al.
Published: (2003)
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
DDOS avoidance strategy for service avalibilty
by: AlRashidi, Bedour Fahhad Hamed
Published: (2015)
by: AlRashidi, Bedour Fahhad Hamed
Published: (2015)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Sensing Danger: Innate Immunology for Intrusion Detection
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
Topological comparison-based wormhole detection for MANET
by: Chan, King-Sun, et al.
Published: (2014)
by: Chan, King-Sun, et al.
Published: (2014)
Strategic Alert Throttling for Intrusion Detection Systems
by: Tedesco, Gianni, et al.
Published: (2005)
by: Tedesco, Gianni, et al.
Published: (2005)
Strategic Alert Throttling for Intrusion Detection Systems
by: Tedesco, Gianni, et al.
Published: (2005)
by: Tedesco, Gianni, et al.
Published: (2005)
Real-time alert correlation with type graphs
by: Tedesco, Gianni, et al.
Published: (2008)
by: Tedesco, Gianni, et al.
Published: (2008)
Behavioural correlation for malicious bot detection
by: Al-Hammadi, Yousof Ali Abdulla
Published: (2010)
by: Al-Hammadi, Yousof Ali Abdulla
Published: (2010)
Rule Generalisation in Intrusion Detection Systems using Snort
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
Strategic communications and the challenges of the post 9/11 world / Philip M. Taylor
by: Taylor, Philip M.
Published: (2008)
by: Taylor, Philip M.
Published: (2008)
Iterative group-based and difference ranking method for online rating systems with spamming attacks
by: Fu, Quan-Yun, et al.
Published: (2021)
by: Fu, Quan-Yun, et al.
Published: (2021)
Stability and Control Assessment of an Aerial Target Drone Based on a Scale Model of A-4 Skyhawk Jet Fighter
by: Bakar, Abu Zaid
Published: (2009)
by: Bakar, Abu Zaid
Published: (2009)
Chaos Theory Based Detection against Network Mimicking DDoS Attacks
by: Chonka, A., et al.
Published: (2009)
by: Chonka, A., et al.
Published: (2009)
Improving anomalous rare attack detection rate for intrusion detection system using support vector machine and genetic programming
by: Mohd Pozi, Muhammad Syafiq, et al.
Published: (2016)
by: Mohd Pozi, Muhammad Syafiq, et al.
Published: (2016)
Design and implementation of a web-based replacement for the manual system of moderating exams
by: Oladokun, Adeola Asiat
Published: (2014)
by: Oladokun, Adeola Asiat
Published: (2014)
A super-peer architecture to improve intrusion detection and scalability in collaborative intrusion detection network
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
An Immune Network Intrusion Detection System Utilising Correlation Context
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
An immune inspired Network Intrusion Detection System utilising correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016)
by: Abbas, Borkan Ahmed
Published: (2016)
Name-signature lookup system: a security enhancement to named data networking
by: Song, Zhicheng, et al.
Published: (2021)
by: Song, Zhicheng, et al.
Published: (2021)
Detecting wormhole and Byzantine attacks in mobile ad hoc networks
by: Alam, Mohammad Rafiqul
Published: (2011)
by: Alam, Mohammad Rafiqul
Published: (2011)
Negativity and information in campaign advertising
by: Sullivan, Jonathan
Published: (2010)
by: Sullivan, Jonathan
Published: (2010)
Incidence and impact of dog attacks on guide dogs in the UK: an update
by: Moxon, Rachel, et al.
Published: (2016)
by: Moxon, Rachel, et al.
Published: (2016)
Characterisation of class F fly ash geopolymer pastes immersed in acid and alkaline solutions
by: Temuujin, Jadambaa, et al.
Published: (2011)
by: Temuujin, Jadambaa, et al.
Published: (2011)
Sulphate resistance of slag blended fly ash based geopolymer concrete
by: Deb, Partha, et al.
Published: (2013)
by: Deb, Partha, et al.
Published: (2013)
Cognitive radio network security: A survey
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
The media and information environments ten years after 9/11 / Gary D. Rawnsley
by: Rawnsley, Gary D.
Published: (2011)
by: Rawnsley, Gary D.
Published: (2011)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Detecting anomalous process behaviour using second generation Artificial Immune Systems
by: Twycross, Jamie, et al.
Published: (2010)
by: Twycross, Jamie, et al.
Published: (2010)
Analyzing factors influencing customer satisfaction on purchased cybersecurity solutions within B2B organizations in Malaysia
by: Subramaniam, Nageswar Rao
Published: (2024)
by: Subramaniam, Nageswar Rao
Published: (2024)
Integrating real-time analysis with the dendritic cell algorithm through segmentation
by: Gu, Feng, et al.
Published: (2009)
by: Gu, Feng, et al.
Published: (2009)
The 9/11 decade media discourse: content analysis on correspondents’ reports in Al Jazeera online / Noratikah Mohamad Ashari and Mokhtar Mohammad
by: Mohamad Ashari, Noratikah, et al.
Published: (2014)
by: Mohamad Ashari, Noratikah, et al.
Published: (2014)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
Development of a Saltwater Intrusion Software Using Visual Basic
by: Tan, Chiau Siang
Published: (2001)
by: Tan, Chiau Siang
Published: (2001)
Remote assessment of platelet function in patients with acute stroke or transient ischaemic attack
by: Bath, Philip M.W., et al.
Published: (2017)
by: Bath, Philip M.W., et al.
Published: (2017)
Safety and efficacy of intensive vs. guideline antiplatelet therapy in high-risk patients with recent ischemic stroke or transient ischemic attack: rationale and design of the Triple Antiplatelets for Reducing Dependency after Ischaemic Stroke (TARDIS) trial (ISRCTN47823388)
by: Beridze, M., et al.
Published: (2015)
by: Beridze, M., et al.
Published: (2015)
Fractal cracking patterns in concretes exposed to sulfate attack
by: Yao, J., et al.
Published: (2019)
by: Yao, J., et al.
Published: (2019)
Similar Items
-
Adaptive alert throttling for intrusion detection systems
by: Tedesco, Gianni, et al.
Published: (2003) -
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018) -
DDOS avoidance strategy for service avalibilty
by: AlRashidi, Bedour Fahhad Hamed
Published: (2015) -
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007) -
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)