An Effective High Threating Alarm Mining Method for Cloud Security Management
暂无分享,去创建一个
Tao Qin | Yongwei Meng | Yukun Liu | Chao He
[1] Asmaa Shaker Ashoor,et al. Difference between Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) , 2011 .
[2] Mohamed G. Gouda,et al. Firewall design: consistency, completeness, and compactness , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[3] Domenico Cotroneo,et al. Filtering Security Alerts for the Analysis of a Production SaaS Cloud , 2014, 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing.
[4] Christopher Krügel,et al. Comprehensive approach to intrusion detection alert correlation , 2004, IEEE Transactions on Dependable and Secure Computing.
[5] Jian Pei,et al. Mining frequent patterns without candidate generation , 2000, SIGMOD '00.
[6] Peng Ning,et al. Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.
[7] Neelam Dwivedi,et al. Event Correlation for Intrusion Detection Systems , 2015, 2015 IEEE International Conference on Computational Intelligence & Communication Technology.
[8] Yue Gao,et al. The Study of Network Security Event Correlation Analysis Based on Similar Degree of the Attributes , 2013, 2013 Fourth International Conference on Digital Manufacturing & Automation.
[9] Sandeep Kumar,et al. A Software Architecture to Support Misuse Intrusion Detection , 1995 .
[10] Sokratis K. Katsikas,et al. Reducing false positives in intrusion detection systems , 2010, Comput. Secur..
[11] Domenico Cotroneo,et al. Empirical Analysis and Validation of Security Alerts Filtering Techniques , 2019, IEEE Transactions on Dependable and Secure Computing.
[12] Gabriel Maciá-Fernández,et al. A model-based survey of alert correlation techniques , 2013, Comput. Networks.
[13] M. Grabisch. The application of fuzzy integrals in multicriteria decision making , 1996 .
[14] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[15] Frédéric Cuppens,et al. Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[16] José M. Fernandez,et al. ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework , 2013, FPS.
[17] Wenjuan Li,et al. EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism , 2014, Comput. Secur..
[18] Alfonso Valdes,et al. Probabilistic Alert Correlation , 2001, Recent Advances in Intrusion Detection.