2012 International Conference on Computer &Amp; Information Science (ICCIS) 2012
DOI: 10.1109/iccisci.2012.6297279
|View full text |Cite
|
Sign up to set email alerts
|

Alert correlation framework using a novel clustering approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…False alarm minimization schemes based on correlating IDS alarms with network vulnerabilities are proposed in . These schemes use reference numbers of vulnerabilities along with other context information parameters to verify the TP alarms.…”
Section: Related Workmentioning
confidence: 99%
“…False alarm minimization schemes based on correlating IDS alarms with network vulnerabilities are proposed in . These schemes use reference numbers of vulnerabilities along with other context information parameters to verify the TP alarms.…”
Section: Related Workmentioning
confidence: 99%
“…This study provided the development directions of CSA and offered conclusions from issue, technical, and application systems. Recently, [22,23] proposed a network threat assessment based on alert verification. Tian et al [24] also proposed a method to quantitatively assess network threat situations based on alerts and contextual information.…”
Section: Introductionmentioning
confidence: 99%
“…Their proposed framework and the novel clustering method, architectured solely with the intention of reducing the amount of alerts generated by IDS. The clustering method was tested against two datasets; a globally used dataset, DARPA and a live dataset from a cyber attack monitoring unit that uses Snort engine to capture the alerts [34].…”
Section: Related Workmentioning
confidence: 99%