2014
DOI: 10.1080/02564602.2014.906864
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Intrusion Alert Correlation and Its Design Considerations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 19 publications
0
8
0
Order By: Relevance
“…Predicting the next activities of the attacker is an imperative and difficult task [13,20,81,82]. Prediction encourages intrusion frameworks to respond appropriately before the network is compromised and gives the chances to overcome the benefits of the attacker.…”
Section: Discussion and Future Research Directionmentioning
confidence: 99%
See 1 more Smart Citation
“…Predicting the next activities of the attacker is an imperative and difficult task [13,20,81,82]. Prediction encourages intrusion frameworks to respond appropriately before the network is compromised and gives the chances to overcome the benefits of the attacker.…”
Section: Discussion and Future Research Directionmentioning
confidence: 99%
“…Table 1 shows the comparison of proposed survey with the existing survey articles, such as [13][14][15][16] focus on alert correlation techniques or a mapping among framework techniques and components. No articles comprehensively reviewed cyber-attack prediction based on intrusion alert correlation techniques, considering the intrusion alert dataset.…”
Section: Introductionmentioning
confidence: 99%
“…Replay Attack. A replay attack is a replay of any previous neighbor or router discovery message to obtain network access [20]. The attacker can capture the NDP message and send it again later.…”
Section: Fig 3 Example Of Na Spoofingmentioning
confidence: 99%
“…This method based on Spearman's Correlation Coefficient to drags out the correlative data's in the scrutinized information attribute that is the complete record of the stakeholders. The aspects are shown in the results [20] Take a random information set contains x 1, x 2 ,x 3…. x n, Let X 1 = { x 1, x 2 ,x 3….…”
Section: Multivariate Correlation Analysis Using Spearmanmentioning
confidence: 99%