2010 2nd Computer Science and Electronic Engineering Conference (CEEC) 2010
DOI: 10.1109/ceec.2010.5606488
|View full text |Cite
|
Sign up to set email alerts
|

Guessing strategy for improving intrusion detections

Abstract: Intrusion detectors isolate intrusions based on allowable and disallowable activities. The disallowable policy enforcers will alert only on events that are known to be bad while the allowable policy enforcer will alert on events that deviate from those that have been classified as good. However, these trade-offs become difficult to balance in a recent time due to the complexity of computer attacks. Accordingly, intrusion detectors generate tons of alerts that may signify realistic and false attacks. Most often… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2010
2010
2012
2012

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(9 citation statements)
references
References 8 publications
0
9
0
Order By: Relevance
“…Researches have shown that intrusion detectors can flag alerts on intrusive packets that expire before they reach destination machines [9,10,13]. One of the reasons behind this is that allowable events can be defined in many respects.…”
Section: Figure 5 Complex Propagation Of Attacksmentioning
confidence: 99%
See 4 more Smart Citations
“…Researches have shown that intrusion detectors can flag alerts on intrusive packets that expire before they reach destination machines [9,10,13]. One of the reasons behind this is that allowable events can be defined in many respects.…”
Section: Figure 5 Complex Propagation Of Attacksmentioning
confidence: 99%
“…Therefore, this paper extends our previous findings on the application of category utility function to evaluate clustering algorithms that are designed to process intrusion logs [10]. Category utility function has been defined in [5] and in [7] as a measure of goodness of dataset that are clustered together [10,12].…”
Section: Introductionmentioning
confidence: 97%
See 3 more Smart Citations