Advanced Information and Knowledge Processing
DOI: 10.1007/1-84628-253-5_5
|View full text |Cite
|
Sign up to set email alerts
|

Data Mining Applied to Intrusion Detection: MITRE Experiences

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
3
0
2

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 0 publications
0
3
0
2
Order By: Relevance
“…By combining K-means algorithms and incremental learning decision trees to reduce the FPR, Bloedorn, Talbot and DeBarr [16] improved the MITRE's network security package that generates about 850,000 alerts a day. The results showed that a 71,094 priority 1 alerts in one day were reduced to 1,011 (over a 98% reduction), allowing the analyst to spend more time on unusual alerts and potentially more stealthy attacks, and thus increase the system level security.…”
Section: Related Workmentioning
confidence: 99%
“…By combining K-means algorithms and incremental learning decision trees to reduce the FPR, Bloedorn, Talbot and DeBarr [16] improved the MITRE's network security package that generates about 850,000 alerts a day. The results showed that a 71,094 priority 1 alerts in one day were reduced to 1,011 (over a 98% reduction), allowing the analyst to spend more time on unusual alerts and potentially more stealthy attacks, and thus increase the system level security.…”
Section: Related Workmentioning
confidence: 99%
“…The main function of the model that we are interested in is classification, as normal, or malicious, or as a particular type of attack [9]. We are also interested in link and sequence analysis [10]. Additionally, data mining systems provide the means to easily perform data summarization and visualization, aiding the security analyst in identifying areas of concern [10].…”
Section: Data Mining and Nidsmentioning
confidence: 99%
“…We are also interested in link and sequence analysis [10]. Additionally, data mining systems provide the means to easily perform data summarization and visualization, aiding the security analyst in identifying areas of concern [10]. The models must be represented in some form.…”
Section: Data Mining and Nidsmentioning
confidence: 99%
“…Οι κανόνεσ ορίηονται με διαφορετικά χαρακτθριςτικά όπωσ διεφκυνςθ αποςτολζα, διεφκυνςθ παραλιπτθ, κφρα επικοινωνίασ, flags, όρια κίνθςθσ, κ.ά. Ζνα μεγάλο πρόβλθμα ςε πολλά ςυςτιματα είναι πωσ ο οριςμόσ των κανόνων είναι μια δφςκολθ και λεπτι διεργαςία και εμπεριζχει ψεφτικοφσ ςυναγερμοφσ (false positive alarm) και χαμζνεσ επικζςεισ (missed detection) [56], [57].…”
Section: η βϊςη δεδομϋνων του συςτόματοσunclassified
“…Αρκετι ζρευνα επικεντρϊνεται ςτθν ανάλυςθ των ακολουκιϊν κυκλοφορίασ κάνοντασ χριςθ τεχνικϊν Data Mining για τθν περιγραφι μοντζλων ανίχνευςθσ ανωμαλιϊν [56], [58], [52], [59], [60], [61], [62], [63].…”
Section: η βϊςη δεδομϋνων του συςτόματοσunclassified