2003
DOI: 10.1007/3-540-36901-5_21
|View full text |Cite
|
Sign up to set email alerts
|

Applying Data Mining Techniques to Analyze Alert Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2010
2010
2013
2013

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…Out them very important procedure for scenario detection is in [19]. Base on an algorithm by name CURE, offline clustering solution is proposed in [20]. The solution makes use of numeric attributes only.…”
Section: Related Workmentioning
confidence: 99%
“…Out them very important procedure for scenario detection is in [19]. Base on an algorithm by name CURE, offline clustering solution is proposed in [20]. The solution makes use of numeric attributes only.…”
Section: Related Workmentioning
confidence: 99%
“…The other two approaches rely on supervised learning techniques. In [18], an offline clustering solution on the CURE algorithm is presented. The solution is limited to numeric attributes.…”
Section: Related Workmentioning
confidence: 99%
“…Later, they constructed the first misuse detection system based on data mining�JAM system, in 2000 [2], [3]. Shin et al [4] utilized it in strategy-based network security management, offered an alarm analyzer using data mining mechanism which consists of association rule digger, frequent item digger and clustering digger, and finally realized the effective support of alarm analysis and high level analysis mmmg systems to security strategy management. Cabrera et al [5] used it to detect the DDOS attacks in MIB database and gained a good detecting result.…”
Section: Related Workmentioning
confidence: 99%