[HTML][HTML] Computational neural network regression model for host based intrusion detection system

SK Gautam, H Om - Perspectives in Science, 2016 - Elsevier
The current scenario of information gathering and storing in secure system is a challenging
task due to increasing cyber-attacks. There exists computational neural network techniques …

Network ids alert classification with frequent itemset mining and data clustering

R Vaarandi, K Podiņš - 2010 International Conference on …, 2010 - ieeexplore.ieee.org
Network IDS is a well-known security measure for network monitoring and protection.
Unfortunately, IDSs are known to generate large amounts of alerts, with many of them being …

Real-time classification of IDS alerts with data mining techniques

R Vaarandi - MILCOM 2009-2009 IEEE Military …, 2009 - ieeexplore.ieee.org
During the last decade, intrusion detection systems (IDSs) have become a widely used
measure for security management. However, these systems often generate many false …

[PDF][PDF] Machine Learning Approach to Combat False Alarms in Wireless Intrusion Detection System.

DS Vijayakumar, S Ganapathy - Comput. Inf. Sci., 2018 - pdfs.semanticscholar.org
Wireless Networks facilitate the ease of communication for sharing the crucial information.
Recently, most of the small and large-scale companies, educational institutions, government …

Using alert cluster to reduce IDS alerts

HW Njogu, L Jiawei - 2010 3rd International Conference on …, 2010 - ieeexplore.ieee.org
Intrusion Detection Systems (IDSs) are known to produce huge volumes of alerts. The
interesting alerts are always mixed with irrelevant, duplicate and non interesting alerts. Huge …

A categorical survey of state-of-the-art intrusion detection system-Snort

A Gupta, LS Sharma - International Journal of Information …, 2020 - inderscienceonline.com
Internet has shown a tremendous growth in the last few years and along with it, the impact,
quality and quantity of threats on it have also increased. Organisations are striving to find …

[PDF][PDF] 基于混沌粒子群的IDS 告警聚类算法

胥小波, 蒋琴琴, 郑康锋, 武斌, 杨义先 - 通信学报, 2013 - infocomm-journal.com
数据挖掘技术在入侵检测中的应用日益广泛, 特别是在管理告警显示方面.
相关研究者把模式识别, 数据挖掘等知识运用到告警的分析上来, 对告警信息进行聚合和关联 …

[PDF][PDF] Real-time intrusion detection alert correlation and attack scenario extraction based on the prerequisite-consequence approach

Z Zali, MR Hashemi, H Saidi - 2012 - sid.ir
Alert correlation systems attempt to discover the relations among ALERT s produced by one
or more INTRUSION detection systems to determine the ATTACK scenarios and their main …

Handling alerts for intrusion detection system using stateful pattern matching

EM Chakir, YI Khamlichi… - 2016 4th IEEE …, 2016 - ieeexplore.ieee.org
Over the years, network intrusion detection systems have evolved to handle varying types of
threats. These days, network managers expect network intrusion detection systems (IDS) to …

A novel signature searching for Intrusion Detection System using data mining

YL Ding, L Li, HQ Luo - 2009 International Conference on …, 2009 - ieeexplore.ieee.org
Intrusion Detection System (IDS) has recently emerged as an important component for
enhancing information system security. Data mining and machine learning technology has …