Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) 2012
DOI: 10.1109/cybersec.2012.6246083
|View full text |Cite
|
Sign up to set email alerts
|

An alert fusion model inspired by artificial immune system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…It is based on the difference between healthy and stressed/injured cells. It assumes that cells do not release alarm signals when they die by normally planned processes (known as apoptosis), while cells release alarm signals when they are stressed, injured, or die abnormally (necrosis) [38].…”
Section: A) Genetic Algorithm (Ga)mentioning
confidence: 99%
“…It is based on the difference between healthy and stressed/injured cells. It assumes that cells do not release alarm signals when they die by normally planned processes (known as apoptosis), while cells release alarm signals when they are stressed, injured, or die abnormally (necrosis) [38].…”
Section: A) Genetic Algorithm (Ga)mentioning
confidence: 99%
“…By calculating the similarities of two pairs of alerts, a score of correlation between these alerts can be determined and the process to group the alerts into different clusters will be based on this score. This method is simple and easy to implement, but failed in detecting complex attacks due to its reliance only on expert knowledge to determine the similarity degree between attack classes [19,20]. In addition, it fails to discover the causal connection between alerts when alerts with different attributes have been induced in a single attack.…”
Section: A Similarities Of Alert Attributesmentioning
confidence: 99%
“…In this case, the repeated comparisons between alerts will lead to a very huge computational overload especially in large-scale networks. Besides this, this approach requires a lengthy initial period of training [19]. Table I shows some current related works of alert correlation with their approach.…”
Section: Expert System and Data Miningmentioning
confidence: 99%
See 1 more Smart Citation