2006
DOI: 10.1117/12.661003
|View full text |Cite
|
Sign up to set email alerts
|

Mining security events in a distributed agent society

Abstract: In distributed agent architecture, tasks are performed on multiple computers which are sometimes spread across different locations. While it is important to collect security critical sensory information from the agent society, it is equally important to analyze and report such security events in a precise and useful manner. Data mining techniques are found to be very efficient in the generation of security event profiles. This paper describes the implementation of such a security alert mining tool which genera… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Time window size and support values are discussed and the approaches are evaluated using DARPA 1998 dataset. Dasgupta et al [4] used frequent episode mining to analyze security alerts from DARPA 2000 dataset. Some limitations, e.g., minimal confidence and maximal episode length, are mentioned, but the data mining component is otherwise described very briefly as a part of a larger system.…”
Section: Alert Correlationmentioning
confidence: 99%
See 1 more Smart Citation
“…Time window size and support values are discussed and the approaches are evaluated using DARPA 1998 dataset. Dasgupta et al [4] used frequent episode mining to analyze security alerts from DARPA 2000 dataset. Some limitations, e.g., minimal confidence and maximal episode length, are mentioned, but the data mining component is otherwise described very briefly as a part of a larger system.…”
Section: Alert Correlationmentioning
confidence: 99%
“…In total, we got 16 million security alerts. The alerts are formatted in IDEA 4 , an extensible data exchange format inspired by IDMEF and suited for the needs of SABU platform. Each alert contains at least a timestamp and a category of a reported event.…”
Section: Datasetmentioning
confidence: 99%
“…Therefore, based on the SoftMan theory, we have constructed a cooperation control model for intrusion detection system based on multi-SoftMan alliance (MSMIDS) [7]. This system model is adopted distributed architecture [8,9] 2) Data collection SoftMan (DCSM) is a special SoftMan for collection data. DCSM may be located in a detected Host or Server.…”
Section: B the Architecture Of Softmanmentioning
confidence: 99%