作者
Klaus Julisch, Marc Dacier
发表日期
2002/7/23
图书
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
页码范围
366-375
简介
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for signs of security violations. The use of intrusion detection has given rise to another difficult problem, namely the handling of a generally large number of alarms. In this paper, we mine historical alarms to learn how future alarms can be handled more efficiently. First, we investigate episode rules with respect to their suitability in this approach. We report the difficulties encountered and the unexpected insights gained. In addition, we introduce a new conceptual clustering technique, and use it in extensive experiments with real-world data to show that intrusion detection alarms can be handled efficiently by using previously mined knowledge.
引用总数
200320042005200620072008200920102011201220132014201520162017201820192020202120222023202483030413223292326211519191920171193642
学术搜索中的文章
K Julisch, M Dacier - Proceedings of the eighth ACM SIGKDD international …, 2002