Automated Verification Methodology of Security Events Based on Heuristic Analysis
We present an automated verification methodology of the security events, that is, IDS alerts, based on heuristic analysis. The proposed verification methodology aims to automatically identify real cyberattacks from the security events and filter out false positive, so that the security analyst is ab...
Main Authors: | Jungsuk Song, Younsu Lee, Kyuil Kim, Seokhun Kim, SooKyun Kim, Sang-Soo Choi |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi - SAGE Publishing
2015-09-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1155/2015/817918 |
Similar Items
-
Hexagonal Stimulation Digital Controller Design and Verification for Wireless Subretinal Implant Device
by: Wajahat Abbasi, et al.
Published: (2022-04-01) -
Meta-Heuristic Optimization and Comparison for Battery Pack Thermal Systems Using Simulink
by: Dae Yun Kim, et al.
Published: (2023-11-01) -
Experimental Verification of Use of Vacuum Insulating Material in Electric Vehicle Headliner to Reduce Thermal Load
by: Soo-Whang Baek, et al.
Published: (2019-10-01) -
Population-Based Meta-Heuristic Algorithms for Integrated Batch Manufacturing and Delivery Scheduling Problem
by: Yong-Jae Kim, et al.
Published: (2022-11-01) -
Character segmentation heuristics for check amount verification
by: Khan, Salman Amin, 1976-
Published: (2009)