False alarm minimization techniques in signature-based intrusion detection systems: A survey

N Hubballi, V Suryanarayanan - Computer Communications, 2014 - Elsevier
A network based Intrusion Detection System (IDS) gathers and analyzes network packets
and report possible low level security violations to a system administrator. In a large network …

Systematic literature review of security event correlation methods

I Kotenko, D Gaifulina, I Zelichenok - Ieee Access, 2022 - ieeexplore.ieee.org
Security event correlation approaches are necessary to detect and predict incremental
threats such as multi-step or targeted attacks (advanced persistent threats) and other causal …

A systematic survey on multi-step attack detection

J Navarro, A Deruyver, P Parrend - Computers & Security, 2018 - Elsevier
Since the beginning of the Internet, cyberattacks have threatened users and organisations.
They have become more complex concurrently with computer networks. Nowadays …

Feature selection using information gain for improved structural-based alert correlation

TA Alhaj, MM Siraj, A Zainal, HT Elshoush, F Elhaj - PloS one, 2016 - journals.plos.org
Grouping and clustering alerts for intrusion detection based on the similarity of features is
referred to as structurally base alert correlation and can discover a list of attack steps …

Dealing with security alert flooding: using machine learning for domain-independent alert aggregation

M Landauer, F Skopik, M Wurzenberger… - ACM Transactions on …, 2022 - dl.acm.org
Intrusion Detection Systems (IDS) secure all kinds of IT infrastructures through automatic
detection of malicious activities. Unfortunately, they are known to produce large numbers of …

RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection

AA Ramaki, M Amini, RE Atani - computers & security, 2015 - Elsevier
Today, from information security perspective, prevention methods are not enough solely.
Early Warning Systems (EWSs) are in the category of reactive methods. These systems are …

Alert correlation algorithms: A survey and taxonomy

SA Mirheidari, S Arshad, R Jalili - … , November 13-15, 2013, Proceedings 5, 2013 - Springer
Alert correlation is a system which receives alerts from heterogeneous Intrusion Detection
Systems and reduces false alerts, detects high level patterns of attacks, increases the …

Systematic review and quantitative comparison of cyberattack scenario detection and projection

I Kovačević, S Groš, K Slovenec - Electronics, 2020 - mdpi.com
Intrusion Detection Systems (IDSs) automatically analyze event logs and network traffic in
order to detect malicious activity and policy violations. Because IDSs have a large number of …

Intrusion alert prioritisation and attack detection using post-correlation analysis

R Shittu, A Healing, R Ghanea-Hercock… - Computers & …, 2015 - Elsevier
Event Correlation used to be a widely used technique for interpreting alert logs and
discovering network attacks. However, due to the scale and complexity of today's networks …

A comprehensive approach for network attack forecasting

M GhasemiGol, A Ghaemi-Bafghi, H Takabi - computers & security, 2016 - Elsevier
Forecasting future attacks is a big challenge for network administrators because future is
generally unknown. Nevertheless, some information about the future can help us make …