2012
DOI: 10.3923/ijscomp.2012.302.309
|View full text |Cite
|
Sign up to set email alerts
|

Correlated Alerts and Non-Intrusive Alerts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…For the massive security data issues, Tiwari [1] reviewed the new challenges for information security after the information explosion, and Liu [2] proposed the method of monitoring network security events using network security big data. Alert correlated analysis in big data analyzes the massive altering messages generated by detecting tools, it mainly focuses on alert aggregation, attack validation, and alert correlation, which deploys the alarm attribute similarity calculation method [3] [4]. The network and host security correlation analysis methods reference the ideas of recommendation algorithms, which associate host information in network based on the similarity of network node flow and host abnormality degrees [5] [6].…”
Section: Introductionmentioning
confidence: 99%
“…For the massive security data issues, Tiwari [1] reviewed the new challenges for information security after the information explosion, and Liu [2] proposed the method of monitoring network security events using network security big data. Alert correlated analysis in big data analyzes the massive altering messages generated by detecting tools, it mainly focuses on alert aggregation, attack validation, and alert correlation, which deploys the alarm attribute similarity calculation method [3] [4]. The network and host security correlation analysis methods reference the ideas of recommendation algorithms, which associate host information in network based on the similarity of network node flow and host abnormality degrees [5] [6].…”
Section: Introductionmentioning
confidence: 99%
“…In anomalybased case, they need learning process and detection is more complex. In addition, attack detection techniques are far from satisfactory [1]. In fact, solutions like IDSs provide unmanageable amount of alarms to security administrators and these thousands of alarms by day are hard to inspect especially if the majority of them are false positives.…”
Section: Introductionmentioning
confidence: 99%
“…For a matter of formalism simplicity and better performances, some approaches offer adapted solutions for a kind or two of attacks or a certain type of flow. However, unlike attacks that evolve very quickly, they are neither extensible nor scalable and they are far from satisfactory [1]. Moreover, actually, many security devices are from different constructors, open source or not, offering different formalisms.…”
Section: Introductionmentioning
confidence: 99%