False alarm minimization techniques in signature-based intrusion detection systems: A survey

N Hubballi, V Suryanarayanan - Computer Communications, 2014 - Elsevier
A network based Intrusion Detection System (IDS) gathers and analyzes network packets
and report possible low level security violations to a system administrator. In a large network …

A systematic survey on multi-step attack detection

J Navarro, A Deruyver, P Parrend - Computers & Security, 2018 - Elsevier
Since the beginning of the Internet, cyberattacks have threatened users and organisations.
They have become more complex concurrently with computer networks. Nowadays …

Alert correlation survey: framework and techniques

R Sadoddin, A Ghorbani - … of the 2006 international conference on …, 2006 - dl.acm.org
Managing raw alerts generated by various sensors are becoming of more significance to
intrusion detection systems as more sensors with different capabilities are distributed …

Detecting DDoS attacks in cloud computing environment

AM Lonea, DE Popescu, H Tianfield - International Journal of …, 2013 - univagora.ro
This paper is focused on detecting and analyzing the Distributed Denial of Service (DDoS)
attacks in cloud computing environments. This type of attacks is often the source of cloud …

Toward a more practical unsupervised anomaly detection system

J Song, H Takakura, Y Okabe, K Nakao - Information Sciences, 2013 - Elsevier
During the last decade, various machine learning and data mining techniques have been
applied to Intrusion Detection Systems (IDSs) which have played an important role in …

System and method for case management

E Zimiles - US Patent App. 12/350,161, 2009 - Google Patents
0001. The present application claims the priority of US Provisional Application Ser. No.
61/006,342 filed Jan. 7, 2008, and US Provisional Application Ser. No. 61/136,937 filed Oct …

Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory

D Yu, D Frincke - Proceedings of the 43rd annual Southeast regional …, 2005 - dl.acm.org
Accurate identification of misuse is a key factor in determining appropriate ways to protect
systems. Modern intrusion detection systems often use alerts from different sources such as …

Prioritizing intrusion analysis using Dempster-Shafer theory

L Zomlot, SC Sundaramurthy, K Luo, X Ou… - Proceedings of the 4th …, 2011 - dl.acm.org
Intrusion analysis and incident management remains a difficult problem in practical network
security defense. The root cause of this problem is the large rate of false positives in the …

Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net

D Yu, D Frincke - Computer Networks, 2007 - Elsevier
Intrusion detection systems (IDS) often provide poor quality alerts, which are insufficient to
support rapid identification of ongoing attacks or predict an intruder's next likely goal. In this …

Aiding intrusion analysis using machine learning

L Zomlot, S Chandran, D Caragea… - 2013 12th International …, 2013 - ieeexplore.ieee.org
Intrusion analysis, ie, the process of combing through IDS alerts and audit logs to identify
real successful and attempted attacks, remains a difficult problem in practical network …