A systematic map** study on intrusion alert analysis in intrusion detection systems
Intrusion alert analysis is an attractive and active topic in the area of intrusion detection
systems. In recent decades, many research communities have been working in this field …
systems. In recent decades, many research communities have been working in this field …
A model-based survey of alert correlation techniques
As telecommunication networks evolve rapidly in terms of scalability, complexity, and
heterogeneity, the efficiency of fault localization procedures and the accuracy in the …
heterogeneity, the efficiency of fault localization procedures and the accuracy in the …
Bigdata logs analysis based on seq2seq networks for cognitive Internet of Things
While bigdata system processes high-volume data at high speed, it also generates a large
amount of logs. However, it is hard for people to predict future events based on massive …
amount of logs. However, it is hard for people to predict future events based on massive …
A realistic graph‐based alert correlation system
OB Fredj - Security and Communication Networks, 2015 - Wiley Online Library
This paper introduces a graph‐based attack description that comes with different analysis
methods for alert correlation. The system encompasses an attack scenario detection …
methods for alert correlation. The system encompasses an attack scenario detection …
Improved intrusion detection system using fuzzy logic for detecting anamoly and misuse type of attacks
Currently available intrusion detection systems focus mainly on determining uncharacteristic
system events in distributed networks using signature based approach. Due to its limitation …
system events in distributed networks using signature based approach. Due to its limitation …
Enhancing the accuracy of intrusion detection systems by reducing the rates of false positives and false negatives through multi-objective optimization
F Hachmi, K Boujenfa, M Limam - Journal of Network and Systems …, 2019 - Springer
Intrusion detection systems (IDSs) are the fundamental parts of any network security
infrastructure given their role as layers of defense against hackers. However, IDSs generate …
infrastructure given their role as layers of defense against hackers. However, IDSs generate …
A new generic taxonomy on hybrid malware detection technique
Malware is a type of malicious program that replicate from host machine and propagate
through network. It has been considered as one type of computer attack and intrusion that …
through network. It has been considered as one type of computer attack and intrusion that …
RepCIDN: A reputation-based collaborative intrusion detection network to lessen the impact of malicious alarms
Distributed and coordinated attacks in computer networks are causing considerable
economic losses worldwide in recent years. This is mainly due to the transition of attackers' …
economic losses worldwide in recent years. This is mainly due to the transition of attackers' …
[PDF][PDF] An improved framework for intrusion alert correlation
Alert correlation analyzes the alerts from one or more collaborative Intrusion Detection
Systems (IDSs) to produce a concise overview of security-related activity on the network …
Systems (IDSs) to produce a concise overview of security-related activity on the network …
Towards an IT service lifecycle management (ITSLM) Concept
Information Technology (IT) usage in enterprises has evolved over the last years. This led to
today's complex, heterogeneous, and dynamic IT system landscapes that support business …
today's complex, heterogeneous, and dynamic IT system landscapes that support business …