Using Fuzzy Cognitive Maps to Reduce False Alerts in SOM based Intrusion Detection Sensors
Most of the intrusion detection sensors suffer from the high rate offake alerts that the sensor produce.
| Main Authors: | Jazzar, Mahmoud, Jantan, Aman |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Subjects: | |
| Online Access: | http://eprints.usm.my/24986/ http://eprints.usm.my/24986/1/Using_Fuzzy_Cognitive_Maps_to_Reduce_False_Alerts_in_SOM_based_Intrusion_Detection_Sensors.pdf |
Similar Items
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
Parallel Network Alert Management System For IDS False Positive Reduction
by: el-Taj, Homam Reda Kamel
Published: (2011)
by: el-Taj, Homam Reda Kamel
Published: (2011)
An Integrated Approach Using Self
Organizing Maps And Fuzzy Cognitive
Maps For Network Intrusion Detection
by: Jazzar, Mahmoud
Published: (2009)
by: Jazzar, Mahmoud
Published: (2009)
Intrusion Alert Quality Framework For
Security False Alert Reduction
by: Abu Bakar, Najwa
Published: (2007)
by: Abu Bakar, Najwa
Published: (2007)
Towards music fitness evaluation with the hierarchical SOM
by: Edwin Hui Hean, Law, et al.
Published: (2008)
by: Edwin Hui Hean, Law, et al.
Published: (2008)
Evolving music generation with SOM-fitness genetic programming
by: Phon-Amnuaisuk, Somnuk, et al.
Published: (2007)
by: Phon-Amnuaisuk, Somnuk, et al.
Published: (2007)
Network intrusion alert correlation challenges and techniques
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
Intrusion Alert Quality Framework For Security False Alert Reduction [TH9737. N162 2007 f rb].
by: Abu Bakar, Najwa
Published: (2007)
by: Abu Bakar, Najwa
Published: (2007)
A comparative study of different fuzzy classifiers for cloud intrusion detection systems' alerts
by: Alqahtani, Saeed M., et al.
Published: (2016)
by: Alqahtani, Saeed M., et al.
Published: (2016)
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
Dependencies Management in Dynamically Updateable Component-Based System.
by: Alhazbi, Saleh, et al.
Published: (2007)
by: Alhazbi, Saleh, et al.
Published: (2007)
Determining The Black-Box Component's Failure.
by: Hilal, Ibrahim, et al.
Published: (2007)
by: Hilal, Ibrahim, et al.
Published: (2007)
Toward Pure Componentware
by: Alhazbi, Saleh, et al.
Published: (2007)
by: Alhazbi, Saleh, et al.
Published: (2007)
Protocol Based Interaction in Component-Based Software Systems.
by: Alhazbi, Saleh, et al.
Published: (2007)
by: Alhazbi, Saleh, et al.
Published: (2007)
Development Of Energy-Balanced Node
Deployment Strategies To Reduce Energy
Hole Problem In Wireless Sensor
Networks
by: Asharioun, Hadi
Published: (2015)
by: Asharioun, Hadi
Published: (2015)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
Enhancement of Glove-Based Approach to Dynamic Signature Verification by Reducing Number of Sensors
by: Shohel, Sayeed, et al.
Published: (2008)
by: Shohel, Sayeed, et al.
Published: (2008)
Design and development of network intrusion detection system detection scheme on network processing unit
by: Robin Salim,, et al.
Published: (2006)
by: Robin Salim,, et al.
Published: (2006)
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
A new approach based on honeybee guarding system to improve intrusion detection system.
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
Image Encrytion Using Block Based Transformation Algorithm
by: Bani Younes, Mohammad Ali, et al.
Published: (2008)
by: Bani Younes, Mohammad Ali, et al.
Published: (2008)
A Feature Selection Approach for Network Intrusion Detection
by: Khor, Kok-Chin, et al.
Published: (2009)
by: Khor, Kok-Chin, et al.
Published: (2009)
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012)
by: Khor, Kok Chin, et al.
Published: (2012)
Towards a Privacy Diagnosis Centre : Measuring k-anonymity
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008)
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008)
Self-organizing map (SOM) for species distribution modelling of birds species at Kenyir landscape
by: Salwana, Mohamad, et al.
Published: (2019)
by: Salwana, Mohamad, et al.
Published: (2019)
Improving Chaotic Cryptographic
Primitives Based On Map’s
Complexity And Period Length Of
The Chaotic Maps
by: Masoumi, Amir Akhavan
Published: (2015)
by: Masoumi, Amir Akhavan
Published: (2015)
Establishing a Probabilistic Model for Cognitive Learning Style
by: Teh, Yoke-Jin, et al.
Published: (2005)
by: Teh, Yoke-Jin, et al.
Published: (2005)
Cognitive Radio-Based Power Adjustment For Wi-Fi.
by: Tat, Chee Wan
Published: (2009)
by: Tat, Chee Wan
Published: (2009)
Representation and reasoning of fuzzy temporal knowledge
by: Nor Azlinayati Abdul Manaf,, et al.
Published: (2006)
by: Nor Azlinayati Abdul Manaf,, et al.
Published: (2006)
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
Data Reduction in Intrusion Alert Correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Network intrusion detection and alert system
by: To, Jin Yi
Published: (2024)
by: To, Jin Yi
Published: (2024)
An adaptive fuzzy min-max conflict-resolving classifier
by: Tan, , Shing Chiang, et al.
Published: (2006)
by: Tan, , Shing Chiang, et al.
Published: (2006)
Fuzzy modeling based recognition of multi-font numerals
by: Hanmandlu, Madasu, et al.
Published: (2003)
by: Hanmandlu, Madasu, et al.
Published: (2003)
Unconstrained handwritten character recognition based on fuzzy logic
by: Hanmandlu, M
Published: (2003)
by: Hanmandlu, M
Published: (2003)
A proposed mapping architecture between IAX and jingle protocols
by: Haj Aliwi, Hadeel Saleh, et al.
Published: (2016)
by: Haj Aliwi, Hadeel Saleh, et al.
Published: (2016)
Comparison between fuzzy and NN method for speech emotion recognition
by: Razak,, AA, et al.
Published: (2005)
by: Razak,, AA, et al.
Published: (2005)
Probabilistic ensemble simplified fuzzy ARTMAP for sonar target differentiation
by: Loo, Chu Kiong, et al.
Published: (2006)
by: Loo, Chu Kiong, et al.
Published: (2006)
Using fuzzy logic to identify significant factors of negotiation performance
by: Tameur, Nachef
Published: (2013)
by: Tameur, Nachef
Published: (2013)
Numerical And Approximate- Analytical Solution Of Fuzzy Initial Value Problems
by: Al-Jassar, Ali Fareed Jameel
Published: (2015)
by: Al-Jassar, Ali Fareed Jameel
Published: (2015)
Similar Items
-
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013) -
Parallel Network Alert Management System For IDS False Positive Reduction
by: el-Taj, Homam Reda Kamel
Published: (2011) -
An Integrated Approach Using Self
Organizing Maps And Fuzzy Cognitive
Maps For Network Intrusion Detection
by: Jazzar, Mahmoud
Published: (2009) -
Intrusion Alert Quality Framework For
Security False Alert Reduction
by: Abu Bakar, Najwa
Published: (2007) -
Towards music fitness evaluation with the hierarchical SOM
by: Edwin Hui Hean, Law, et al.
Published: (2008)