2018
DOI: 10.1155/2018/3614093
|View full text |Cite
|
Sign up to set email alerts
|

Network Intrusion Detection with Threat Agent Profiling

Abstract: With the increase in usage of computer systems and computer networks, the problem of intrusion detection in network security has become an important issue. In this paper, we discuss approaches that simplify network administrator's work. We applied clustering methods for security incident profiling. We consider -means, PAM, and CLARA clustering algorithms. For this purpose, we used data collected in Warden system from various security tools. We do not aim to differentiate between normal and abnormal network tra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 39 publications
0
6
0
Order By: Relevance
“…Intrusion Attack: Unauthorized access of computer resources and potential information that violates the integrity is known as an Intrusion attack where the attacker can attack in the application layer, transport layer, and network layer [74]. Several Intrusion Detection systems are designed to monitor data traffic, recognizing any harmful actions [9].…”
Section: Captcha Breaking: Captcha (Completely Automatedmentioning
confidence: 99%
“…Intrusion Attack: Unauthorized access of computer resources and potential information that violates the integrity is known as an Intrusion attack where the attacker can attack in the application layer, transport layer, and network layer [74]. Several Intrusion Detection systems are designed to monitor data traffic, recognizing any harmful actions [9].…”
Section: Captcha Breaking: Captcha (Completely Automatedmentioning
confidence: 99%
“…The data set offers an up-to-date view of network security alerts and reflects the current cybersecurity threat landscape. The data set encourages experimenting with the advanced methods of alert aggregation and correlation [4] , including temporal and spatial correlations [6] , reputation scoring [7] , attack scenario reconstruction [8] , and attack projection [9] . Alert correlation and attack scenario reconstructions methods allow inferring insights into the behavior of the attackers.…”
Section: Value Of the Datamentioning
confidence: 99%
“…It is vital for cybersecurity to update data sets and traces of attacks as new ones appear continuously [5] . Temporal and spatial correlations allow for characterizing the overall cybersecurity situation and its changes in time [6] . Reputation scoring helps in assembling effective blacklists [7] .…”
Section: Value Of the Datamentioning
confidence: 99%
See 2 more Smart Citations