A two-stage technique to improve intrusion detection systems based on data mining algorithms
暂无分享,去创建一个
[1] Maria Papadaki,et al. A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm , 2010, Comput. Secur..
[2] Hongli Zhang,et al. Intrusion detection alarms reduction using root cause analysis and clustering , 2009, Comput. Commun..
[3] Gregory Piatetsky-Shapiro,et al. Discovery, Analysis, and Presentation of Strong Rules , 1991, Knowledge Discovery in Databases.
[4] Stefano Zanero,et al. Reducing false positives in anomaly detectors through fuzzy alert aggregation , 2009, Inf. Fusion.
[5] Shahrin Sahib,et al. Intrusion Alert Correlation Technique Analysis for Heterogeneous Log , 2008 .
[6] Maria Papadaki,et al. The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset , 2008, TrustBus.
[7] Ali A. Ghorbani,et al. Alert Correlation for Extracting Attack Strategies , 2006, Int. J. Netw. Secur..
[8] Klaus Julisch,et al. Clustering intrusion detection alarms to support root cause analysis , 2003, TSEC.
[9] Khaled Labib,et al. NSOM: A Real-Time Network-Based Intrusion Detection System Using Self-Organizing Maps , 2002 .
[10] Boleslaw K. Szymanski,et al. NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS , 2002 .
[11] Sokratis K. Katsikas,et al. Reducing false positives in intrusion detection systems , 2010, Comput. Secur..