2005
DOI: 10.1007/11427995_18
|View full text |Cite
|
Sign up to set email alerts
|

A Cognitive Model for Alert Correlation in a Distributed Environment

Abstract: Abstract. The area of alert fusion for strengthening information assurance in systems is a promising research area that has recently begun to attract attention. Increased demands for "more trustworthy" systems and the fact that a single sensor cannot detect all types of misuse/anomalies have prompted most modern information systems deployed in distributed environments to employ multiple, diverse sensors. Therefore, the outputs of the sensors must be fused in an effective and intelligent manner in order to prov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…In terms of Prioritization, the alerts are categorized based on their severity, e.g., using attack ranks [14]. To solve problems of alert correlation, a variety of disciplines are used, e.g., machine learning, data mining [11], or fuzzy techniques [12]. Most of the efforts do not consider the aspect of performance, which is needed in case of huge amounts of alerts.…”
Section: A Alert Correlationmentioning
confidence: 99%
See 1 more Smart Citation
“…In terms of Prioritization, the alerts are categorized based on their severity, e.g., using attack ranks [14]. To solve problems of alert correlation, a variety of disciplines are used, e.g., machine learning, data mining [11], or fuzzy techniques [12]. Most of the efforts do not consider the aspect of performance, which is needed in case of huge amounts of alerts.…”
Section: A Alert Correlationmentioning
confidence: 99%
“…The correlation algorithms [1] can be classified as: Scenario-based correlation [7], Rule-based correlation [8], Statistical correlation [9], and Temporal correlation [10]. False alert reduction can be done by using such techniques as data mining [11] or fuzzy techniques [12]. Attack strategy analysis often depends on reasoning and prediction of attacks missed by the IDS [13].…”
Section: A Alert Correlationmentioning
confidence: 99%
“…The first category involves expert knowledge used to construct a system for classifying, correlating, and ranking alerts based on external knowedge of existing attacks [3] [10]. Rules may also be aggregated using userdefined similarity metrics based on expert knowledge [3], and some alerts may be completely ignored outright if prior knowledge suggests that they are irrelevant [13].…”
Section: Related Workmentioning
confidence: 99%
“…if a set of alerts shows the same time pattern of occurrence, the alerts are correlated. False alert reduction can be done by using such techniques as data mining [26] or fuzzy techniques [27]. Attack strategy analysis often depends on reasoning and prediction of attacks missed by the IDS [28].…”
Section: Alert Correlation and Its Performancementioning
confidence: 99%
“…To solve problems of alert correlation, a variety of disciplines are used, e.g. machine learning, data mining [26], or fuzzy techniques [27]. Most of the efforts do not consider the aspect of performance, which is needed in the case of huge amounts of alerts.…”
Section: Alert Correlation and Its Performancementioning
confidence: 99%