False Positive Alerts Reduction by Correlating the Intrusion Detection System Alerts: Investigation Study
False Positive Alerts Reduction by Correlating the Intrusion Detection System Alerts: Investigation Study
出处
《通讯和计算机(中英文版)》
2010年第3期25-31,共7页
Journal of Communication and Computer
参考文献21
-
1Y.H. Liao, V.R. Vemuri, Use of K-Nearest neighbor classifier for intrusion detection, Elsevier Science, Computers & Security 21 (2002) 439-448.
-
2A. Alharby, H. Imai, IDS false alert reduction using continuous and discontinuous patterns, Computer Science, Springerlink 3531 (2005) 192-205.
-
3A. Sundaram, An introduction to intrusion detection, Special Issue on Computer Security 2 (1996) 3-7.
-
4M.J. Ranum, False Positives: A User's Guide to Making Sense of IDS Alerts, ICSA Labs IDSC, 2003.
-
5H. Debar, D. Curry, B. Feinstein, Intrusion detection exchange format, Internet draft, available online at: http://www.ietf.org/rfc/rfc4765.txt, 2009.
-
6R. Ur Rehman, Intrusion detection systems with Snort: advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID, 2003, pp. 66-70.
-
7K. Timm, Strategies to reduce false positives and false negatives in NIDS, Security Focus Article, available online at: http://www.securityfocus.com/infocus/1463, 2009.
-
8W. Yurcik, Controlling intrusion detection systems by generating false positives: squealing proof-of-concept, 27th Annual IEEE Conference on Local Computer Networks, 2002.
-
9M. Jazzar, A.B. Jantan, Using fuzzy cognitive maps to reduce false alerts in sore-based intrusion detection sensors, in: Proceeding of the Second Asia International Conference on Modelling & Simulation, 2008.
-
10P.C. Hsiu; C.F. Kuo, T.W. Kuo, E.Y.T Juan. Scenario based threat detection and attack analysis, International Carnahan Conference on Security Technology, 2005, pp. 279-282.
-
1弯弯.解析打印机的虚假警报[J].大众软件,2002(13):81-82.
-
2刘捷通.企业如何应对安全产品“误报”?[J].计算机与网络,2016,42(22):62-62.
-
3段祥雯.自适应虚警处理框架研究与实现[J].计算机应用研究,2009,26(6):2141-2144. 被引量:4
-
4李培国,杨天奇.蜜罐对于网络安全方面的价值[J].计算机工程与设计,2005,26(11):2983-2985. 被引量:7
-
5段祥雯,张怡.IDS虚警处理技术研究[J].计算机研究与发展,2006,43(z2):447-451. 被引量:1
-
6贾志平,杨武,云晓春.一个分布式高效网络入侵检测系统[J].微计算机信息,2006(01X):33-35. 被引量:6
-
7曾述可,张阳,程亮,邓艺,冯登国.一种静态分析工具的优化方法[J].小型微型计算机系统,2015,36(4):648-653. 被引量:3
-
8钟晓班.防虚假警报的装置[J].管理观察,1999,0(8):35-35.
-
9Soroush Amidi.OneWireless:可靠的工业无线方案[J].自动化博览,2013,30(2):58-60.
-
10刘靖,刘建伟,张铁林,陈建华,刘芋存.安全报警融合环境中信息的关联[J].计算机工程与应用,2011,47(25):107-111. 被引量:2