International Journal of Soft Computing

Year: 2012
Volume: 7
Issue: 6
Page No. 302 - 309

Correlated Alerts and Non-Intrusive Alerts

Authors : Dhanakoti Vennila and R. Nedunchezhian

References

Bridges, S.M. and R.B. Vaughn 2000. Intrusion detection via fuzzy data mining. Proceeding of the Accepted for Presentation at The Twelfth Annual Canadian Information Technology Security Symposium, June 19-23, 2000, The Ottawa Congress Centre -.

Cuppens, F. and A. Miege, 2002. Alert correlation in a cooperative intrusion detection framework. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, IEEE Computer Society, 2002 August 30, 2002, Berkeley, California, USA., 202-215.

Cuppens, F., 2001. Managing alerts in a multi-intrusion detection environment. Proceedings of the 17th Annual Computer Security Applications Conference, December 10-14, 2001, New Orleans, Louisiana pp: 22-31.

Das, K., 2001. Protocol anomaly detection for network-based intrusion detection. SANS Institute, GSEC Practical Assignment Version 1.2f, http://www.sans.org/reading_room/whitepapers/detection/protocol-anomaly-detection-network-based-intrusion-detection_349.

Di Pietro, R. and L.V. Mancini, 2008. Intrusion Detection Systems: Advances in Information Security. Springer, London, UK., ISBN-13: 9780387772653, Pages: 264.

Hwang, K., H. Liu and Y. Chen, 2004. Cooperative anomaly and intrusion detection for Alert correlation in networked computing systems. IEEE Transaction on Dependable and Secure Computing, vol. 3, No. 1

Hwang, K., M. Cai, Y. Chen and M. Qin, 2007. Hybrid intrusion detection with weighted signature generation over anomalous internet episodes. IEEE Trans. Dependable Secure Comput., 4: 41-55.
CrossRef  |  

Luo, J., 1999. Integrating fuzzy logic with data mining methods for intrusion detection. M.Sc. Thesis, Mississippi State University, Department of Computer Science.

Maggi, F., M. Matteucci and S. Zanero, 2009. Reducing false positives in anomaly detectors through fuzzy alert aggregation Inf. Fusion, 10: 300-311.
CrossRef  |  

Morin, B. and H. Debar, 2003. Correlation of intrusion symptoms: An application of chronicles. Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection (RAID2003), Volume 2820, September 8-10, 2003, Pittsburgh, PA, USA., pp: 94-112.

Morin, B., L. Me, H. Debar and M. Ducass, 2009. A logic-based model to support alert correlation in intrusion detection. Inf, Fusion, 10: 285-299.
CrossRef  |  

Morin, B., L. Me, H. Debar and M. Ducasse, 2008. M4D4: A logical framework to support alert correlation in intrusion detection. http://www.rennes.supelec.fr/aces/PUBLIS/aces-l2.3.pdf.

Ning, P., Y. Cui and D.S. Reeves, 2002. Constructing attack scenarios through correlation of intrusion alerts Proceedings of the 9th ACM Conference on Computer and Communications Security, November 18-22, 2002, Washington, DC., 245-254.

Perdisci, R., G. Giacinto and F. Roli, 2006. Alarm clustering for intrusion detection systems in computer networks. Eng. Appl. Artif. Intelli., 19: 429-438.
CrossRef  |  

Porras, P.A., M.W. Fong and A. Valdes, 2002. A mission-impactbased approach to INFOSEC alarm correlation In Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection, October 2002, Zurich, Switzerland 95-114.

Toosi, A.N. and M. Kahani, 2007. A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Comput. Commun., 30: 2201-2212.
CrossRef  |  

Valdes, A. and K. Skinner, 2001. Probabilistic alert correlation. Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection, October 10-12, 2001, Davis, CA, USA., pp: 54-68.

Wu, S.X. and W. Banzhaf, 2010. The use of computational intelligence in intrusion detection systems: A review. Appl. oft Comput., 10: 1-35.
CrossRef  |  

Xu, D. and P. Ning, 2008. Correlation Analysis of Intrusion Alerts. In: Intrusion Detection Systems: Advances in Information Security, Pietro, R.D. and L.V. Mancini (Eds.). Vol. 38, Springer, London UK., pp: 65-92.

Zhou, C.V., C. Leckie and S. Karunasekera, 2009. Decentralized multidimensional alert correlation for collaborative intrusion detection J. Network Comput. Appl., 32: 1106-1123.
CrossRef  |  

Zhou, C.V., C. Leckie and S. Karunasekera, 2010. A survey of coordinated attacks and collaborative intrusion detection. Comp. Security, 29: 124-140.
CrossRef  |  

Zurutuza, U. and R. Uribeetxeberria, 2004. Intrusion detection alarm correlation: A survey. Proceedings of the IADAT International Conference on Telecommunications and Computer Networks, December 3-4, 2004, Donostia, Spain. -.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved