The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2015
DOI: 10.1016/j.cose.2014.12.003
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion alert prioritisation and attack detection using post-correlation analysis

Abstract: This is the accepted version of the paper.This version of the publication may differ from the final published version.Permanent repository link: http://openaccess.city.ac.uk/8680/ Link to published version: http://dx. AbstractEvent Correlation used to be a widely used technique for interpreting alert logs and discovering network attacks. However, due to the scale and complexity of today's networks and attacks, alert logs produced by these modern networks are much larger in volume and difficult to analyse. In t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 51 publications
(23 citation statements)
references
References 29 publications
0
23
0
Order By: Relevance
“…Clustering algorithms had been used in past to detect cyber attacks such as intrusion detection (Shittu, Healing, Ghanea-Hercock, Bloomfield, andRajarajan 2015, Casas, Mazel, andOwezarski 2012), anomaly detection (Akoglu, Tong, and Koutra 2015), and many more. The main idea behind the intrusion detection using a clustering algorithm is based on the main idea of clustering the attack nodes in the graph together.…”
Section: Community Discovering and Clustering Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…Clustering algorithms had been used in past to detect cyber attacks such as intrusion detection (Shittu, Healing, Ghanea-Hercock, Bloomfield, andRajarajan 2015, Casas, Mazel, andOwezarski 2012), anomaly detection (Akoglu, Tong, and Koutra 2015), and many more. The main idea behind the intrusion detection using a clustering algorithm is based on the main idea of clustering the attack nodes in the graph together.…”
Section: Community Discovering and Clustering Algorithmsmentioning
confidence: 99%
“…The main idea behind the intrusion detection using a clustering algorithm is based on the main idea of clustering the attack nodes in the graph together. Event correlation proposed by Shittu et al (Shittu, Healing, Ghanea-Hercock, Bloomfield, and Rajarajan 2015) use the post-correlation methods to cluster the correlated attacks together. Akoglu et al (Akoglu, Tong, and Koutra 2015) have summarized various applications of clustering approach to detect anomaly detection when the attacker is tampering sensitive data.…”
Section: Community Discovering and Clustering Algorithmsmentioning
confidence: 99%
“…Shittu et.al. [19] propsed A comperhensive System for Analysing Intrusion Alerts (ACSAnIA). it contains seven components which are: (1) Offline Correlation (2) Online Correlation (3)Meta alert Comparison (4) Meta–alert Prioritisation (5)Meta–alert Clustering (6) Attack Pattern Discovery and (7) Reporting System.…”
Section: Related Workmentioning
confidence: 99%
“…Intrusion detection system has been studied by means of machine learning, and the detection rate has got improvements [12][13][14][15][16][17][18][19]. In addition, intrusion detection has been performed by using feature association technique, and the data set has been used for analysis [20][21][22][23][24][25].…”
Section: Anomaly Detectionmentioning
confidence: 99%