2005
DOI: 10.3745/kipstc.2005.12c.6.855
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and Performance Analysis on the Response Capacity against Alert Information in an Intrusion Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Similarly, bursts of messages may be indicative of spam campaigns [32]. Others investigate the negative impact that bursts of network traffic have on the accuracy of anomaly detection [33] or on the possibility that the intrusion detection tools may be unable to cope with an extremely high rate of alerts when they arrive in a major burst [2], [34]. Others propose effective approaches to handling and aggregating bursts of alerts [33], [35].…”
Section: B Prior Work On Burstinessmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, bursts of messages may be indicative of spam campaigns [32]. Others investigate the negative impact that bursts of network traffic have on the accuracy of anomaly detection [33] or on the possibility that the intrusion detection tools may be unable to cope with an extremely high rate of alerts when they arrive in a major burst [2], [34]. Others propose effective approaches to handling and aggregating bursts of alerts [33], [35].…”
Section: B Prior Work On Burstinessmentioning
confidence: 99%
“…While this lends no new insight as to how to find novel intrusions, understanding and modeling the dynamics of burstiness in intrusion detection would help anticipate the variability of detections over time using established intrusion detection methods. One obvious benefit that would accrue from such a model, if calibrated for a given network, would be to enable a manager of MSSP operations to project the workload and allocate and schedule the efforts of cyber analysts and other resources in a more effective manner (compare with similar arguments in [2]). …”
mentioning
confidence: 99%