The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
19th Annual Computer Security Applications Conference, 2003. Proceedings.
DOI: 10.1109/csac.2003.1254330
|View full text |Cite
|
Sign up to set email alerts
|

Log correlation for intrusion detection: a proof of concept

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
34
0

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 62 publications
(34 citation statements)
references
References 7 publications
0
34
0
Order By: Relevance
“…Although, three major gaps lie in the studies about forecasting of cyber attacks: a) the use of few sensors and/or sensors employed locally; b) the use of just one forecasting technique; and c) lack of information sharing among sensors to be used for correlation (Pontes & Guelfi, 2009a). Correlation of information between IDPS and forecasters means looking for similar characteristics that may be related (Pontes & Guelfi, 2009a) (Abad et al, 2003). Throughout correlation it is possible to eliminate redundant and false data, to discover attack patterns and understand attack strategies (Zhay et al, 2006).…”
Section: Analogy With Forecasting In Cyber Securitymentioning
confidence: 99%
See 4 more Smart Citations
“…Although, three major gaps lie in the studies about forecasting of cyber attacks: a) the use of few sensors and/or sensors employed locally; b) the use of just one forecasting technique; and c) lack of information sharing among sensors to be used for correlation (Pontes & Guelfi, 2009a). Correlation of information between IDPS and forecasters means looking for similar characteristics that may be related (Pontes & Guelfi, 2009a) (Abad et al, 2003). Throughout correlation it is possible to eliminate redundant and false data, to discover attack patterns and understand attack strategies (Zhay et al, 2006).…”
Section: Analogy With Forecasting In Cyber Securitymentioning
confidence: 99%
“…Multi-correlation or integration of alerts with information from different sources, e.g. tools for monitoring or operating system logs, can allow a new classification for alerts, improving accuracy of the results (Abad et al, 2003), (Zhay et al, 2006). References (Abad et al, 2003), (Zhay et al, 2006), (Zhay et al, 2004) employed multi-correlation; however neither a detailed analysis concerning influence of isolated alerts in the FP rates, nor forecasting techniques were not applied for predicting future attacks (forecasting).…”
Section: Analogy With Forecasting In Cyber Securitymentioning
confidence: 99%
See 3 more Smart Citations