Enhanced Alert Correlation Framework for Heterogeneous Log
Management of intrusion alarms particularly in identifying malware attack is becoming more demanding due to large amount of alert produced by low-level detectors. Alert correlation can provide high-level view of intrusion alerts but incapable of handling large amount of alarm. This paper proposes an...
| Main Authors: | Yusof, R., Selamat, S. R., Sahib, S., Mas'ud, M. Z., Abdollah, M. F. |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/80/ http://eprints.utem.edu.my/id/eprint/80/1/Enhanced_ACF_for_Heterogeneous_log-id_47_camera_ready.pdf |
Similar Items
Intrusion Alert Correlation Technique Analysis for Heterogeneous Log
by: Yusof, R., et al.
Published: (2008)
by: Yusof, R., et al.
Published: (2008)
Alert Correlation Technique Analysis For Diverse Log
by: Yusof, R., et al.
Published: (2008)
by: Yusof, R., et al.
Published: (2008)
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Threshold verification using Statistical Approach for Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
An Improved Traditional Worm Attack Pattern
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
A New Malware Attack Pattern Generalization
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
A New Generic Taxonomy on Hybrid Malware Detection Technique
by: Yusof, R., et al.
Published: (2009)
by: Yusof, R., et al.
Published: (2009)
New Multi-step Worm Attack Model
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
Advanced Trace Pattern For Computer Intrusion Discovery
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Scenario Based Worm Trace Pattern Identification Technique
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Statistical Approach for Validating Static Threshold in Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Host Based Detection Approach using Time Based
Module for Fast Attack Detection Behavior
by: Abdollah, M. F., et al.
Published: (2011)
by: Abdollah, M. F., et al.
Published: (2011)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Recognizing P2P Botnets Characteristic Through TCP Distinctive Behaviour
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
Intrusion Alert Quality Framework For
Security False Alert Reduction
by: Abu Bakar, Najwa
Published: (2007)
by: Abu Bakar, Najwa
Published: (2007)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
Generic Taxonomy of Social Engineering Attack
by: Mohd Foozy, F, et al.
Published: (2011)
by: Mohd Foozy, F, et al.
Published: (2011)
Adapting Traceability in Digital Forensic Investigation Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Mapping Process of Digital Forensic Investigation Framework
by: Selamat, S. R., et al.
Published: (2008)
by: Selamat, S. R., et al.
Published: (2008)
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
Data Reduction in Intrusion Alert Correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Network Administration & Management
by: Yusof, R., et al.
Published: (2007)
by: Yusof, R., et al.
Published: (2007)
Real-time alert correlation with type graphs
by: Tedesco, Gianni, et al.
Published: (2008)
by: Tedesco, Gianni, et al.
Published: (2008)
Network intrusion alert correlation challenges and techniques
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
by: Md. Siraj, Maheyzah, et al.
Published: (2008)
Virtual Machine based Autonomous Web Server
by: Mas’ud, M. Z., et al.
Published: (2011)
by: Mas’ud, M. Z., et al.
Published: (2011)
Traceability in Digital Forensic Investigation
Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Threshold verification using statistical approach for fast attack detection
by: Abdollah, Mohd Faizal, et al.
Published: (2009)
by: Abdollah, Mohd Faizal, et al.
Published: (2009)
Detecting Botnets Through Log Correlation
by: Al-Hammadi, Yousof, et al.
Published: (2006)
by: Al-Hammadi, Yousof, et al.
Published: (2006)
Filtering events using clustering in heterogeneous security logs
by: Hajamydeen, Asif Iqbal, et al.
Published: (2011)
by: Hajamydeen, Asif Iqbal, et al.
Published: (2011)
Action detection system for alerting driver using computer vision
by: Khoo, Chia Hong
Published: (2020)
by: Khoo, Chia Hong
Published: (2020)
Traffic Sign Board Recognition and Voice Alert System using CNN
by: Yogesh, C.M., et al.
Published: (2024)
by: Yogesh, C.M., et al.
Published: (2024)
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
by: Abdollah, M. F., et al.
Published: (2008)
by: Abdollah, M. F., et al.
Published: (2008)
Performance Enhancements in IEEE 802.11 DCF MANET through Variation of SIFS Values in Distance Vector Routing Environment
by: Md Khambari, M. N., et al.
Published: (2011)
by: Md Khambari, M. N., et al.
Published: (2011)
Intrusion Alert Quality Framework For Security False Alert Reduction [TH9737. N162 2007 f rb].
by: Abu Bakar, Najwa
Published: (2007)
by: Abu Bakar, Najwa
Published: (2007)
Correlation and persistence of hunting and logging
impacts on tropical rainforest mammals
by: Brodie, Jedediah F., et al.
Published: (2015)
by: Brodie, Jedediah F., et al.
Published: (2015)
The Global Outbreak Alert and Response Network
by: Mackenzie, John, et al.
Published: (2014)
by: Mackenzie, John, et al.
Published: (2014)
Enhancing Protein Fold Prediction Accuracy Using New Physicochemical-Based Features And Fusion Of Heterogeneous Classifiers
by: Dehzangi, Abdollah
Published: (2010)
by: Dehzangi, Abdollah
Published: (2010)
Permeability prediction: core vs log-derived values
by: A. Kadir, A. Aziz, et al.
Published: (1995)
by: A. Kadir, A. Aziz, et al.
Published: (1995)
Framework For Resolving Environmental Damages in Niger Delta Through Deterrence Measures
by: Ya’u, Abba, et al.
Published: (2019)
by: Ya’u, Abba, et al.
Published: (2019)
Similar Items
-
Intrusion Alert Correlation Technique Analysis for Heterogeneous Log
by: Yusof, R., et al.
Published: (2008) -
Alert Correlation Technique Analysis For Diverse Log
by: Yusof, R., et al.
Published: (2008) -
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009) -
Threshold verification using Statistical Approach for Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2009) -
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010)