2013
DOI: 10.1080/18756891.2013.802114
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing False Alarm Reduction Using Voted Ensemble Selection in Intrusion Detection

Abstract: Network intrusion detection systems (NIDSs) have become an indispensable component for the current network security infrastructure. However, a large number of alarms especially false alarms are a big problem for these systems which greatly lowers the effectiveness of NIDSs and causes heavier analysis workload. To address this problem, a lot of intelligent methods (e.g., machine learning algorithms) have been proposed to reduce the number of false alarms, but it is hard to determine which one is the best. We ar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 48 publications
(23 citation statements)
references
References 24 publications
0
23
0
Order By: Relevance
“…Moreover, incorporation of post-processing algorithms (false alarm filter) as proposed in Refs. [26,27] will be considered to alleviate base-rate fallacy. Fourth, multi-level granular regions (geometric or semantic) will be utilized to alleviate location mismatch problem as mentioned above.…”
Section: Discussionmentioning
confidence: 99%
“…Moreover, incorporation of post-processing algorithms (false alarm filter) as proposed in Refs. [26,27] will be considered to alleviate base-rate fallacy. Fourth, multi-level granular regions (geometric or semantic) will be utilized to alleviate location mismatch problem as mentioned above.…”
Section: Discussionmentioning
confidence: 99%
“…The training samples were used to calculate the similarity with the data to be classified, and the accuracy of the method was obtained by using tenfold cross‐validation. This study used the classification algorithm of supervised learning, which is a learning model that is learned or built from the training data (Cuong, Dinh, & Ho, Meng & Kwok, ). This study used the Naïve Bayes, Bayes Net, KNN, J48, and LibSVM classification algorithms in the experimental stage.…”
Section: Methodsmentioning
confidence: 99%
“…In addition to the challenge-based trust mechanism, trust management of distributed IDS networks can be also built by using information theory [42] and game theory [44]. To further enhance the performance of an IDS, many optimization approaches have been designed in literature, such as alarm reduction [26], alarm verification [30], [31] and many filtration mechanisms (e.g., EFM [29]).…”
Section: B Related Workmentioning
confidence: 99%