Streamlined Alarms for Intrusion Recognition System

A serious blow to the security of World Wide Web is the escalation in synchronized system assaults like Hoax, Blended Threats, Worms, IP Scanning, Trojan Horses, Denial of Service DOS and Sniffer assaults. It might not be a wonder that by allowing all the contestants in Intrusion Recognition Systems IRS sharing doubtful intellect with one another in order to shape a worldwide view of the existing risks. Since existing Collective Intrusion Recognition System CIRS algorithms are not capable of calculating complex attacks in a timely manner, a rationalized multilayered red alarm connection for collective intrusion recognition intelligent algorithm was built for CIRS to tackle these confronts. A multilayered red alarm connection grouping algorithm is used to mine the important intrusion prototypes from unrefined intrusion alarms. Twin phase association algorithms are modified and used, so that it groups alarm at every IRS, before exposing important alarm prototypes to a world wide web.

[1]  Christopher Leckie,et al.  Decentralized multi-dimensional alert correlation for collaborative intrusion detection , 2009, J. Netw. Comput. Appl..

[2]  Frédéric Cuppens,et al.  Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[3]  Balachander Krishnamurthy,et al.  Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites , 2002, WWW.

[4]  George Varghese,et al.  Automatically inferring patterns of resource consumption in network traffic , 2003, SIGCOMM '03.

[5]  M. Hemalatha,et al.  Effective approach toward Intrusion Detection System using data mining techniques , 2014 .

[6]  Sidi Mohamed Benslimane,et al.  Towards Ontological Structures Extraction from Folksonomies: An Efficient Fuzzy Clustering Approach , 2014, Int. J. Intell. Inf. Technol..

[7]  Robert B. K. Brown,et al.  Towards Intelligent Requirements , 2015, Int. J. Intell. Inf. Technol..

[8]  Christopher Leckie,et al.  A survey of coordinated attacks and collaborative intrusion detection , 2010, Comput. Secur..

[9]  Andrew Ilachinski,et al.  Modelling insurgent and terrorist networks as self-organised complex adaptive systems , 2012, Int. J. Parallel Emergent Distributed Syst..

[10]  Andreas Hilbert,et al.  Process Model for Content Extraction from Weblogs , 2014, Int. J. Intell. Inf. Technol..

[11]  Balachander Krishnamurthy,et al.  Collaborating against common enemies , 2005, IMC '05.

[12]  Nashat Mansour,et al.  Filtering intrusion detection alarms , 2009, Cluster Computing.

[13]  Meharouech Sourour,et al.  Network Security Alerts Management Architecture for Signature-Based Intrusions Detection Systems within a NAT Environment , 2011 .

[14]  John C. S. Lui,et al.  Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.

[15]  Shanshan Song,et al.  Collaborative Internet Worm Containment , 2005, IEEE Secur. Priv..

[16]  Qi Zhang,et al.  Indra: a peer-to-peer approach to network intrusion detection and prevention , 2003, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003..