2006
DOI: 10.1016/j.cose.2005.09.004
|View full text |Cite
|
Sign up to set email alerts
|

Real-time analysis of intrusion detection alerts via correlation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(16 citation statements)
references
References 10 publications
0
16
0
Order By: Relevance
“…Most of the existing approaches in alert correlation can be categorized as similarity‐based, scenario‐based, precondition/postcondition–based, or statistical causality analysis approaches. In similarity‐based methods , the correlation probability between alerts is estimated on the basis of the similarity of their attributes. Methods in this category can be classified into two subgroups: knowledge‐based methods that require some expert knowledge in the form of alert type similarity to find correlated alerts and inference‐based methods that specify the causally related alerts by using statistical or machine‐learning techniques.…”
Section: Related Workmentioning
confidence: 99%
“…Most of the existing approaches in alert correlation can be categorized as similarity‐based, scenario‐based, precondition/postcondition–based, or statistical causality analysis approaches. In similarity‐based methods , the correlation probability between alerts is estimated on the basis of the similarity of their attributes. Methods in this category can be classified into two subgroups: knowledge‐based methods that require some expert knowledge in the form of alert type similarity to find correlated alerts and inference‐based methods that specify the causally related alerts by using statistical or machine‐learning techniques.…”
Section: Related Workmentioning
confidence: 99%
“…Correspondingly, they can be used to correlate previously unseen attacks. Meanwhile, correlation techniques, which identify similarities between events largely use clustering techniques to group them based on their features [23]. A general drawback of these approaches is that empirically acquired domain knowledge is required to configure the clustering mechanisms, although some exceptions exist [24].…”
Section: Resilience Strategy Deploymentmentioning
confidence: 99%
“…The key part of this algorithm is the compute of alarms correlation degree. Currently, related algorithm are being widely studied [11,12,13], and it is not the important point of this paper, so we just choose the real time method of literature [14].…”
Section: Reappearance Of Intrusion Scenariomentioning
confidence: 99%