Toward an efficient ontology-based event correlation in SIEM
Cooperative intrusion detection use several intrusion detection systems (IDS) and analyzers
in order to build a reliable overview of the monitored system trough a central security …
in order to build a reliable overview of the monitored system trough a central security …
Security challenges in intrusion detection
Organizations and governments consider security as a must-have due to the increasing rate
of attacks which is threatening both security and privacy. In this paper, we present a survey …
of attacks which is threatening both security and privacy. In this paper, we present a survey …
[PDF][PDF] Alert correlation in intrusion detection: Combining AI-based approaches for exploiting security operators' knowledge and preferences
Alert correlation is a crucial problem for monitoring and securing computer networks. It
consists in analyzing the alerts triggered by intrusion detection systems (IDSs) and other …
consists in analyzing the alerts triggered by intrusion detection systems (IDSs) and other …
[PDF][PDF] The cybercrime process: an overview of scientific challenges and methods
P Lallement - Int. J. Adv. Comput. Sci. Appl, 2013 - Citeseer
The cybercrime process : an overview of scientific challenges and methods Page 1 (IJACSA)
International Journal of Advanced Computer Science and Applications, Vol. 4, No. 12, 2013 72 …
International Journal of Advanced Computer Science and Applications, Vol. 4, No. 12, 2013 72 …
Implementing a semantic approach for events correlation in siem systems
T Kenaza, A Machou, A Dekkiche - IFIP International Conference on …, 2018 - Springer
Efficient reasoning in intrusion detection needs to manipulate different information provided
by several analyzers in order to build a reliable overview of the underlying monitored system …
by several analyzers in order to build a reliable overview of the underlying monitored system …
Modèles graphiques probabilistes pour la corrélation d'alertes en détection d'intrusions
T Kenaza - 2011 - ccdz.cerist.dz
Résumé Afin de répondre à l'ensemble de ces problématiques, nous proposons dans cette
thèse une nouvelle approche de corrélation d'alertes basée sur les réseaux Bayésiens …
thèse une nouvelle approche de corrélation d'alertes basée sur les réseaux Bayésiens …
[PDF][PDF] Using Vulnerability to Reduce False Positive Rate in Intrusion Detection Systems
Intrusion Detection Systems are an essential tool for network security infrastructure.
However, IDSs have a serious problem which is the generating of massive number of alerts …
However, IDSs have a serious problem which is the generating of massive number of alerts …
[CITATION][C] Research on Multimedia Information Semantic Modeling Technology Based on Description Logic
Y Wang - … of Digital Content Technology and its …, 2012 - Advanced Institutes of Convergence …