Building an Efficient Alert Management Model for Intrusion Detection Systems
暂无分享,去创建一个
Youness Idrissi Khamlichi | Mohamed Moughit | El Mostapha Chakir | M. Moughit | Y. Khamlichi | Y. I. Khamlichi
[1] Jugal K. Kalita,et al. An effective unsupervised network anomaly detection method , 2012, ICACCI '12.
[2] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[3] Youness Idrissi Khamlichi,et al. Handling alerts for intrusion detection system using stateful pattern matching , 2016, 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt).
[4] Alfonso Valdes,et al. A Mission-Impact-Based Approach to INFOSEC Alarm Correlation , 2002, RAID.
[5] N. B. Anuar,et al. Identifying False Alarm for Network Intrusion Detection System Using Hybrid Data Mining and Decision Tree , 2008 .
[6] Stefan Fenz,et al. AURUM: A Framework for Information Security Risk Management , 2009, 2009 42nd Hawaii International Conference on System Sciences.
[7] Maxwell G. Dondo,et al. A Vulnerability Prioritization System Using A Fuzzy Risk Analysis Approach , 2008, SEC.
[8] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[9] Ehab Al-Shaer,et al. Alert prioritization in Intrusion Detection Systems , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.
[10] Mohamed Moughit,et al. An efficient method for evaluating alerts of Intrusion Detection Systems , 2017, 2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS).
[11] Nor Badrul Anuar,et al. A risk index model for security incident prioritisation , 2011 .
[12] Mohiuddin Ahmed,et al. A survey of network anomaly detection techniques , 2016, J. Netw. Comput. Appl..
[13] Pin-Han Ho,et al. Measuring IDS-estimated attack impacts for rational incident response: A decision theoretic approach , 2009, Comput. Secur..
[14] Youki Kadobayashi,et al. Exploring attack graph for cost-benefit security hardening: A probabilistic approach , 2013, Comput. Secur..
[15] Hervé Debar,et al. Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.
[16] Hyunsoo Yoon,et al. Real-time analysis of intrusion detection alerts via correlation , 2006, Comput. Secur..
[17] Mohamed Cheriet,et al. Taxonomy of intrusion risk assessment and response system , 2014, Comput. Secur..
[18] Jill Slay,et al. The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set , 2016, Inf. Secur. J. A Glob. Perspect..