Intrusion alert correlation is multi-step processes that receives alerts from heterogeneous log resources as input and produce a high-level description of the malicious activity on the network. The objective of this study is to analyse the current alert correlation technique and identify the significant criteria in each technique that can improve the Intrusion Detection System(IDS) problem such as prone to alert flooding, contextual problem, false alert and scalability. The existing alert correlation techniques had been reviewed and analysed. From the analysis, six capability criteria have been identified to improve the current alert correlation technique. They are capability to do alert reduction, alert clustering,identify multistep atta...
An intrusion detection system (IDS) perform postcompromise detection of security breaches whenever p...
Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of enterpris...
Network intrusion detection sensors are usually built around low level models of network traffic. Th...
Intrusion alert correlation is multi-step processes that receives alerts from heterogeneous log reso...
Alert correlation is a process that analyses the alerts produced by one or more diverse devices and ...
Management of intrusion alarms particularly in identifying malware attack is becoming more demanding...
Alert correlation is a process that analyzes the raw alerts produced by one or more intrusion detect...
An alert correlation is a high-level alert evaluation technique for managing large volumes of irrele...
Alert correlation is a process that analyzes the alerts produced by one or more intrusion detection ...
Abstract. Alert correlation is a system which receives alerts from heterogene-ous Intrusion Detectio...
Alert correlation is a process that analyzes the raw alerts produced by one or more intrusion detect...
Event Correlation used to be a widely used technique for interpreting alert logs and discovering net...
An Intrusion Detection System (IDS) is one of the major techniques for securing information systems ...
Several alert correlation methods were proposed in the past several years to construct high-level at...
The tremendous increase in usage and complexity of modern communication and network systems connecte...
An intrusion detection system (IDS) perform postcompromise detection of security breaches whenever p...
Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of enterpris...
Network intrusion detection sensors are usually built around low level models of network traffic. Th...
Intrusion alert correlation is multi-step processes that receives alerts from heterogeneous log reso...
Alert correlation is a process that analyses the alerts produced by one or more diverse devices and ...
Management of intrusion alarms particularly in identifying malware attack is becoming more demanding...
Alert correlation is a process that analyzes the raw alerts produced by one or more intrusion detect...
An alert correlation is a high-level alert evaluation technique for managing large volumes of irrele...
Alert correlation is a process that analyzes the alerts produced by one or more intrusion detection ...
Abstract. Alert correlation is a system which receives alerts from heterogene-ous Intrusion Detectio...
Alert correlation is a process that analyzes the raw alerts produced by one or more intrusion detect...
Event Correlation used to be a widely used technique for interpreting alert logs and discovering net...
An Intrusion Detection System (IDS) is one of the major techniques for securing information systems ...
Several alert correlation methods were proposed in the past several years to construct high-level at...
The tremendous increase in usage and complexity of modern communication and network systems connecte...
An intrusion detection system (IDS) perform postcompromise detection of security breaches whenever p...
Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of enterpris...
Network intrusion detection sensors are usually built around low level models of network traffic. Th...