2017
DOI: 10.1155/2017/8439706
|View full text |Cite
|
Sign up to set email alerts
|

A Universal High-Performance Correlation Analysis Detection Model and Algorithm for Network Intrusion Detection System

Abstract: In big data era, the single detection techniques have already not met the demand of complex network attacks and advanced persistent threats, but there is no uniform standard to make different correlation analysis detection be performed efficiently and accurately. In this paper, we put forward a universal correlation analysis detection model and algorithm by introducing state transition diagram. Based on analyzing and comparing the current correlation detection modes, we formalize the correlation patterns and p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…But these relations are not explicit and there are links among sources, types of attacks, reports, and incidents of the same type of attacks. Finally, the value is precisely the actionable knowledge that we can get from the cyber database from analyzing the quality of the data, automatized process, prediction of incidents, or detecting intrusion in different networks (see [30][31][32]). …”
Section: A Case Studymentioning
confidence: 99%
“…But these relations are not explicit and there are links among sources, types of attacks, reports, and incidents of the same type of attacks. Finally, the value is precisely the actionable knowledge that we can get from the cyber database from analyzing the quality of the data, automatized process, prediction of incidents, or detecting intrusion in different networks (see [30][31][32]). …”
Section: A Case Studymentioning
confidence: 99%
“…Machine learning is a profound nominee candidate to combat network attacks and mitigate intrusion on security of the networks (Almseidin et al, 2017; bhai Gupta & Agrawal, 2020; Iman & Ahmad, 2020). However, there are several challenges need to solved in order to have a secure network (Salih & Abdulazeez, 2021;Zhang et al, 2018;Zhu et al, 2017). In modern communication networks, a huge amount of data is transmitted in different networks, small parts of these data might be a suspicious or dangerous, but the majority are normal or are licensed user's data packets (Galar et al, 2011;Krawczyk, 2016).…”
Section: Introductionmentioning
confidence: 99%