[PDF][PDF] Alert classification to reduce false positives in intrusion detection

T Pietraszek - 2006 - Citeseer
Wespi. Without your help this thesis would not have gotten to this stage. Clearly, I am solely
responsible for any mistakes that had remained in the report. Last but not least, I am deeply …

[PDF][PDF] A Probabilistic-driven Ensemble Approach to Perform Event Classification in Intrusion Detection System.

R Saia, S Carta, DR Recupero - KDIR, 2018 - scitepress.org
Nowadays, it is clear how the network services represent a widespread element, which is
absolutely essential for each category of users, professional and non-professional. Such a …

[图书][B] Recent advances in intrusion detection

E Kirda, S Jha, D Balzarotti - 2009 - Springer
On behalf of the Program Committee, it is our pleasure to present the proceedings of the
11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008) …

Data mining applied to intrusion detection: Mitre experiences

EE Bloedorn, LM Talbot, DD DeBarr - Machine Learning and Data Mining …, 2006 - Springer
As computers and the networks that connect them become increasingly important for the
storage and retrieval of vital information, efforts to protect them become even more …

Towards scalable intrusion detection

SA Shaikh, H Chivers, P Nobles, JA Clark, H Chen - Network Security, 2009 - Elsevier
Towards scalable intrusion detection - ScienceDirect Skip to main contentSkip to article
Elsevier logo Journals & Books Help Search My account Sign in View PDF Download full issue …

Towards vulnerability-based intrusion detection with event processing

A Farroukh, M Sadoghi, HA Jacobsen - Proceedings of the 5th ACM …, 2011 - dl.acm.org
Computer systems continue to be breached despite substantial investments in defense
mechanisms to stop attacks from propagating. The accuracy of current intrusion detection …

[图书][B] Intrusion detection systems

R Di Pietro, LV Mancini - 2008 - books.google.com
In our world of ever-increasing Internet connectivity, there is an on-going threat of intrusion,
denial of service attacks, or countless other abuses of computer and network resources. In …

Flow-based intrusion detection

A Sperotto - 2010 - research.utwente.nl
The spread of 1-10Gbps technology has in recent years paved the way to a flourishing
landscape of new, high-bandwidth Internet services. As users, we depend on the Internet in …

Data mining and machine learning—towards reducing false positives in intrusion detection

T Pietraszek, A Tanner - Information security technical report, 2005 - Elsevier
Intrusion Detection Systems (IDSs) are used to monitor computer systems for signs of
security violations. Having detected such signs, IDSs trigger alerts to report them. These …

Improving SIEM alert metadata aggregation with a novel kill-chain based classification model

BD Bryant, H Saiedian - Computers & Security, 2020 - Elsevier
Today's information networks face increasingly sophisticated and persistent threats, where
new threat tools and vulnerability exploits often outpace advancements in intrusion detection …