Online Mining Intrusion Patterns from IDS Alerts
The intrusion detection system (IDS) which is used widely in enterprises, has produced a large number of logs named alerts, from which the intrusion patterns can be mined. These patterns can be used to construct the intrusion scenarios or discover the final objectives of the malicious actors, and ev...
Main Authors: | Kai Zhang, Shoushan Luo, Yang Xin, Hongliang Zhu, Yuling Chen |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-04-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/10/8/2983 |
Similar Items
-
Online Intrusion Scenario Discovery and Prediction Based on Hierarchical Temporal Memory (HTM)
by: Kai Zhang, et al.
Published: (2020-04-01) -
An Intrusion Action-Based IDS Alert Correlation Analysis and Prediction Framework
by: Kai Zhang, et al.
Published: (2019-01-01) -
Intrusion Alert Framework using Semantic Web and Data Mining Approach
by: Jatuphum Juanchaiyaphum, et al.
Published: (2021-11-01) -
Exploiting the Outcome of Outlier Detection for Novel Attack Pattern Recognition on Streaming Data
by: Michael Heigl, et al.
Published: (2021-09-01) -
Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey
by: Hashim Albasheer, et al.
Published: (2022-02-01)