A systematic map** study on intrusion alert analysis in intrusion detection systems

AA Ramaki, A Rasoolzadegan, AG Bafghi - ACM computing surveys …, 2018 - dl.acm.org
Intrusion alert analysis is an attractive and active topic in the area of intrusion detection
systems. In recent decades, many research communities have been working in this field …

A model-based survey of alert correlation techniques

S Salah, G Maciá-Fernández, JE Díaz-Verdejo - Computer Networks, 2013 - Elsevier
As telecommunication networks evolve rapidly in terms of scalability, complexity, and
heterogeneity, the efficiency of fault localization procedures and the accuracy in the …

Bigdata logs analysis based on seq2seq networks for cognitive Internet of Things

P Wu, Z Lu, Q Zhou, Z Lei, X Li, M Qiu… - Future Generation …, 2019 - Elsevier
While bigdata system processes high-volume data at high speed, it also generates a large
amount of logs. However, it is hard for people to predict future events based on massive …

A realistic graph‐based alert correlation system

OB Fredj - Security and Communication Networks, 2015 - Wiley Online Library
This paper introduces a graph‐based attack description that comes with different analysis
methods for alert correlation. The system encompasses an attack scenario detection …

Improved intrusion detection system using fuzzy logic for detecting anamoly and misuse type of attacks

B Shanmugam, NB Idris - 2009 International Conference of Soft …, 2009 - ieeexplore.ieee.org
Currently available intrusion detection systems focus mainly on determining uncharacteristic
system events in distributed networks using signature based approach. Due to its limitation …

Enhancing the accuracy of intrusion detection systems by reducing the rates of false positives and false negatives through multi-objective optimization

F Hachmi, K Boujenfa, M Limam - Journal of Network and Systems …, 2019 - Springer
Intrusion detection systems (IDSs) are the fundamental parts of any network security
infrastructure given their role as layers of defense against hackers. However, IDSs generate …

A new generic taxonomy on hybrid malware detection technique

Y Robiah, SS Rahayu, MM Zaki, S Shahrin… - arxiv preprint arxiv …, 2009 - arxiv.org
Malware is a type of malicious program that replicate from host machine and propagate
through network. It has been considered as one type of computer attack and intrusion that …

RepCIDN: A reputation-based collaborative intrusion detection network to lessen the impact of malicious alarms

M Gil Pérez, F Gomez Marmol… - Journal of Network and …, 2013 - Springer
Distributed and coordinated attacks in computer networks are causing considerable
economic losses worldwide in recent years. This is mainly due to the transition of attackers' …

[PDF][PDF] An improved framework for intrusion alert correlation

HT Elshoush, IM Osman - Proceedings of the World Congress on …, 2012 - iaeng.org
Alert correlation analyzes the alerts from one or more collaborative Intrusion Detection
Systems (IDSs) to produce a concise overview of security-related activity on the network …

Towards an IT service lifecycle management (ITSLM) Concept

N Jamous, S Bosse, C Görling, J Hintsch… - 2016 4th …, 2016 - ieeexplore.ieee.org
Information Technology (IT) usage in enterprises has evolved over the last years. This led to
today's complex, heterogeneous, and dynamic IT system landscapes that support business …