2012
DOI: 10.1007/s10489-012-0383-7
|View full text |Cite
|
Sign up to set email alerts
|

An intrusion detection and alert correlation approach based on revising probabilistic classifiers using expert knowledge

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 40 publications
(21 citation statements)
references
References 36 publications
0
21
0
Order By: Relevance
“…As stated previously, developing systems that are absolutely exploit free is very difficult and close to impossible in the positive and negative IDS alerts [17]. And this become a greater endeavor because regardless of what procedures are in place, an organization is still at risk not only from external attacks but also from the ones from within [35].…”
Section: Researchmentioning
confidence: 99%
See 3 more Smart Citations
“…As stated previously, developing systems that are absolutely exploit free is very difficult and close to impossible in the positive and negative IDS alerts [17]. And this become a greater endeavor because regardless of what procedures are in place, an organization is still at risk not only from external attacks but also from the ones from within [35].…”
Section: Researchmentioning
confidence: 99%
“…IDS do have three areas of interests that most researchers do address to highlight the problem that impair the reliability and effectiveness of detecting harmful actions and to help raise the correct alert [17]. Investigating IDS to mitigate the increase of computer crimes will be effective to reduce loss due to theft and help maintaining the integrity of personal and financial data [14][56].…”
Section: Ids Problemsmentioning
confidence: 99%
See 2 more Smart Citations
“…For such variants i ∈ N , the new degrees are 0s: µ ′ i = 0. For variants from the "yes"-set Y , the new degree can be obtained by one of two different ways (see, e.g., [1], [2], [3], [4], [5], [6], [7], [8], [10]):…”
Section: Formulation Of the Problem In Precise Terms: Case Of Fuzzmentioning
confidence: 99%