Research on Alarm Reduction of Intrusion Detection System Based on Clustering and Whale Optimization Algorithm

L Wang, L Gu, Y Tang - Applied Sciences, 2021 - mdpi.com
With the frequent occurrence of network security events, the intrusion detection system will
generate alarm and log records when monitoring the network environment in which a large …

Malicious message analysis system

A Singh - US Patent 10,581,898, 2020 - Google Patents
A computerized technique is provided to analyze a message for malware by determining
context information from attributes of the message. The attributes are determined by …

An improved frequent pattern growth based approach to intrusion detection system alert aggregation

Y Sun, X Chen - Journal of Physics: Conference Series, 2020 - iopscience.iop.org
This paper introduces different approaches to intrusion detection system (IDS) alert
aggregation and proposes an improved frequent pattern growth (FP-growth) algorithm for it …

Near Real-time Learning and Extraction of Attack Models from Intrusion Alerts

SJ Yang, A Okutan, G Werner, SH Su, A Goel… - arXiv preprint arXiv …, 2021 - arxiv.org
Critical and sophisticated cyberattacks often take multitudes of reconnaissance,
exploitations, and obfuscation techniques to penetrate through well protected enterprise …

[PDF][PDF] Исследование методов корреляции событий безопасности для обеспечения безопасности облачных вычислительных сред

ЕС Новикова, ЯА Бекенева, АВ Шоров - Известия СПбГЭТУ ЛЭТИ, 2017 - izv.etu.ru
Информатика и компьютерные технологии ных сервисов и экономическая выгода.
Новая па радигма построения вычислительных систем, связанная с разделением …

[PDF][PDF] Laurea Triennale in Informatica

L Deri, F Baiardi, SG de Castro - luca.ntop.org
UNIVERSITÀ DI PISA Laurea Triennale in Informatica Analysis of network traffic on the
public network through a honeypot Page 1 UNIVERSITÀ DI PISA DIPARTIMENTO DI …