2010 International Conference on Machine and Web Intelligence 2010
DOI: 10.1109/icmwi.2010.5648098
|View full text |Cite
|
Sign up to set email alerts
|

Integrating security operator knowledge and preferences to the alert correlation process

Abstract: Intrusion Detection Systems (IDS) are necessary for the system monitoring. However they produce a huge quantity of alerts. Alert correlation is a process applied to the IDS alerts in order to reduce their number. In this paper we propose a new approach for alert correlation which enables the integration of new information to the alert correlation process: Security operator's knowledge and preferences. This information concerns the monitoring system and the risk level of each alert in according for instance to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…Bouzar-Benlabiod et al [30] integrates security operator knowledge and preferences to alerts correlation process using qualitative choice logic…”
Section: Non-monotonic Reasoning With DL Jclassic δϵmentioning
confidence: 99%
“…Bouzar-Benlabiod et al [30] integrates security operator knowledge and preferences to alerts correlation process using qualitative choice logic…”
Section: Non-monotonic Reasoning With DL Jclassic δϵmentioning
confidence: 99%
“…This approach uses explicit correlation and its objective is to detect complex attack scenarios [21]. The learning process either supervised or unsupervised is involved.…”
Section: B Predefined Attack Scenariomentioning
confidence: 99%
“…The main advantage for this method is that it is able to accurately to detect well-documented attacks derived from the libraries. But if it is a novel attack, the method will fail to detect the intrusion [5,20,21]. The main concern of this approach is the need of more complete and comprehensive scenario libraries, time and cost to build and maintain them are main concerns.…”
Section: B Predefined Attack Scenariomentioning
confidence: 99%