2010
DOI: 10.1002/sec.261
|View full text |Cite
|
Sign up to set email alerts
|

Network specific false alarm reduction in intrusion detection system

Abstract: Intrusion Detection Systems (IDSs) are used to find the security violations in computer networks. Usually IDSs produce a vast number of alarms that include a large percentage of false alarms. One of the main reason for such false alarm generation is that, in most cases IDSs are run with default set of signatures. In this paper, a scheme for network specific false alarm reduction in IDS is proposed. A threat profile of the network is created and IDS generated alarms are correlated using neural network. Experime… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
29
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(29 citation statements)
references
References 9 publications
0
29
0
Order By: Relevance
“…On the other hand, (FPR) is defined by the number of nodes falsely detected as attacker nodes [35][36][37] and given by We obtain the delay values (in seconds) for both normal flow and attack scenarios after performing all steps, which are discussed in the high-level description of the detection scheme in Fig. 8.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, (FPR) is defined by the number of nodes falsely detected as attacker nodes [35][36][37] and given by We obtain the delay values (in seconds) for both normal flow and attack scenarios after performing all steps, which are discussed in the high-level description of the detection scheme in Fig. 8.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Let TP be the number of true positives, FN the number of false negatives, FP the number of false positives and TN the number of true negatives. Then, DR is defined by the number of attackers detected by the scheme divided by the total number of attackers present in the test set [35][36][37] and given by…”
Section: Simulation Resultsmentioning
confidence: 99%
“…One suggested way to filter or prioritize alerts is to compare installed software with the software products mentioned in the alert [5][6][7][8][9][10]. For instance, if an alert concerns Linux-exploits but is raised for a Windowsmachine, it could be discarded.…”
Section: Information Used By Filtersmentioning
confidence: 99%
“…Generally, IDSs gather and analyze information in a network in order to identify possible security breaches and generate an alert or alarm if an intrusion is detected. There are two classes of IDS : Signature‐based IDS: this recognizes patterns of attack and works in a similar way to antivirus software. The IDS essentially contains attack descriptions or signatures and matches them against the audit data stream, looking for evidence of known attacks.…”
Section: Introductionmentioning
confidence: 99%