Intrusion Alert Correlation Technique Analysis for Heterogeneous Log
Intrusion alert correlation is multi-step processes that receives alerts from heterogeneous log resources as input and produce a high-level description of the malicious activity on the network. The objective of this study is to analyse the current alert correlation technique and identify the signifi...
| Main Authors: | Yusof, R., Selamat, S. R., Sahib, S. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Dr. Sang H. Lee
2008
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/59/ http://eprints.utem.edu.my/id/eprint/59/1/20080919-accepted.pdf |
Similar Items
Enhanced Alert Correlation Framework for Heterogeneous Log
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Alert Correlation Technique Analysis For Diverse Log
by: Yusof, R., et al.
Published: (2008)
by: Yusof, R., et al.
Published: (2008)
Network intrusion alert correlation challenges and techniques
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
Intrusion Alert Quality Framework For
Security False Alert Reduction
by: Abu Bakar, Najwa
Published: (2007)
by: Abu Bakar, Najwa
Published: (2007)
Data Reduction in Intrusion Alert Correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Advanced Trace Pattern For Computer Intrusion Discovery
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Network intrusion detection and alert system
by: To, Jin Yi
Published: (2024)
by: To, Jin Yi
Published: (2024)
Strategic Alert Throttling for Intrusion Detection Systems
by: Tedesco, Gianni, et al.
Published: (2005)
by: Tedesco, Gianni, et al.
Published: (2005)
Strategic Alert Throttling for Intrusion Detection Systems
by: Tedesco, Gianni, et al.
Published: (2005)
by: Tedesco, Gianni, et al.
Published: (2005)
Adaptive alert throttling for intrusion detection systems
by: Tedesco, Gianni, et al.
Published: (2003)
by: Tedesco, Gianni, et al.
Published: (2003)
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
by: Abdollah, M. F., et al.
Published: (2008)
by: Abdollah, M. F., et al.
Published: (2008)
Intrusion Alert Quality Framework For Security False Alert Reduction [TH9737. N162 2007 f rb].
by: Abu Bakar, Najwa
Published: (2007)
by: Abu Bakar, Najwa
Published: (2007)
Action detection system for alerting driver using computer vision
by: Khoo, Chia Hong
Published: (2020)
by: Khoo, Chia Hong
Published: (2020)
Real-time alert correlation with type graphs
by: Tedesco, Gianni, et al.
Published: (2008)
by: Tedesco, Gianni, et al.
Published: (2008)
Mapping Process of Digital Forensic Investigation Framework
by: Selamat, S. R., et al.
Published: (2008)
by: Selamat, S. R., et al.
Published: (2008)
Scenario Based Worm Trace Pattern Identification Technique
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
A New Generic Taxonomy on Hybrid Malware Detection Technique
by: Yusof, R., et al.
Published: (2009)
by: Yusof, R., et al.
Published: (2009)
Using Fuzzy Cognitive Maps to Reduce False Alerts in SOM based Intrusion Detection Sensors
by: Jazzar, Mahmoud, et al.
by: Jazzar, Mahmoud, et al.
Mitigating Unbalanced And Overlapped Problems Of Large Network Intrusion Data Using Multiplelevel Detection Techniques
by: Ho, Yan Bing
Published: (2022)
by: Ho, Yan Bing
Published: (2022)
A comparative study of different fuzzy classifiers for cloud intrusion detection systems' alerts
by: Alqahtani, Saeed M., et al.
Published: (2016)
by: Alqahtani, Saeed M., et al.
Published: (2016)
Traffic Sign Board Recognition and Voice Alert System using CNN
by: Yogesh, C.M., et al.
Published: (2024)
by: Yogesh, C.M., et al.
Published: (2024)
Security alert through path analysis
by: Lo, Kelvin, Yir Siang
Published: (2013)
by: Lo, Kelvin, Yir Siang
Published: (2013)
Log visualization of intrusion and prevention reverse proxy server against web attacks
by: Mantoro, Teddy, et al.
Published: (2013)
by: Mantoro, Teddy, et al.
Published: (2013)
Detecting Botnets Through Log Correlation
by: Al-Hammadi, Yousof, et al.
Published: (2006)
by: Al-Hammadi, Yousof, et al.
Published: (2006)
Permeability prediction: core vs log-derived values
by: A. Kadir, A. Aziz, et al.
Published: (1995)
by: A. Kadir, A. Aziz, et al.
Published: (1995)
Filtering events using clustering in heterogeneous security logs
by: Hajamydeen, Asif Iqbal, et al.
Published: (2011)
by: Hajamydeen, Asif Iqbal, et al.
Published: (2011)
Enabling Avqos For Adaptive Streaming In Heterogeneous Network Environment Utilizing Non-Intrusive Bandwidth Information
by: Lim, Su Jin
Published: (2015)
by: Lim, Su Jin
Published: (2015)
Threshold verification using Statistical Approach for Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Heterogeneous Metal Catalysts for Oxidation Reactions
by: Ali, Md. Eaqub, et al.
Published: (2014)
by: Ali, Md. Eaqub, et al.
Published: (2014)
Preparation Of Heterogeneous Catalysts For Transesterification Of Biofuel
by: Nurhazwani, Binti Mohamed Yahaya
Published: (2012)
by: Nurhazwani, Binti Mohamed Yahaya
Published: (2012)
An Improved Traditional Worm Attack Pattern
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
Industrial Bioprocessing Alert
by: Shaari , N.
Published: (2008)
by: Shaari , N.
Published: (2008)
Integration of well logging and 3D/4D seismic data to map water/gas front saturations in carbonate reservoirs / Mohamed R. Saleh Efnik
by: Mohamed R. , Saleh Efnik
Published: (2018)
by: Mohamed R. , Saleh Efnik
Published: (2018)
New Multi-step Worm Attack Model
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
A New Malware Attack Pattern Generalization
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Traceability in Digital Forensic Investigation
Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Similar Items
-
Enhanced Alert Correlation Framework for Heterogeneous Log
by: Yusof, R., et al.
Published: (2011) -
Alert Correlation Technique Analysis For Diverse Log
by: Yusof, R., et al.
Published: (2008) -
Network intrusion alert correlation challenges and techniques
by: Md. Siraj, Maheyzah, et al.
Published: (2008) -
Intrusion Alert Quality Framework For
Security False Alert Reduction
by: Abu Bakar, Najwa
Published: (2007) -
Data Reduction in Intrusion Alert Correlation
by: Tedesco, Gianni, et al.
Published: (2006)