2002
DOI: 10.1007/978-1-4615-0953-0_5
|View full text |Cite
|
Sign up to set email alerts
|

Fusing A Heterogeneous Alert Stream Into Scenarios

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
125
0
2

Year Published

2006
2006
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 141 publications
(127 citation statements)
references
References 1 publication
0
125
0
2
Order By: Relevance
“…Most of the previous works [2], [3], [5], [6], [7] of alert clustering for finding structural correlation required strong dependencies on SE in developing and/or maintaining their correlation system. They either need pre-defined rules or human expert knowledge to manage and analyze the intrusion alerts.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Most of the previous works [2], [3], [5], [6], [7] of alert clustering for finding structural correlation required strong dependencies on SE in developing and/or maintaining their correlation system. They either need pre-defined rules or human expert knowledge to manage and analyze the intrusion alerts.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, algorithm introduced by [5] required a significant amount of alerts to be managed manually (i.e., hand-clustered) beforehand. Likewise, system by [2] properties to assist the clustering algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…These problems make the reports from IDSs very hard to understand and manage. Many researchers and vendors have proposed various alert correlation techniques (e.g., [6,7,15]) to make large numbers of IDS alerts more understandable and at the same time reduce the impact of false positives and false negatives.…”
Section: Introductionmentioning
confidence: 99%
“…Similar approaches, with similar strengths and shortcomings but different formalisms, have been tried with the specification of pre-and post-conditions of the attacks [4], sometimes along with time-distance criteria [5]. It is possible to mine scenario rules directly from data, either in a supervised [6] or unsupervised [7] fashion. Both approaches use alert classifications as part of their rules.…”
Section: Problem Statement and State Of The Artmentioning
confidence: 99%