Perimeter surveillance systems play an important role in the safety and security of the armed forces. These systems tend to generate alerts in advent of anomalous situations, which require human intervention. The challenge is the generation of false alerts or alert flooding which makes these systems inefficient. In this paper, we focus on short-term as well as long-term prediction of alerts in the perimeter intrusion detection system. We have explored the dependent and independent aspects of the alert data generated over a period of time. Short-term prediction is realized by exploiting the independent aspect of data by narrowing it down to a time-series problem. Time-series analysis is performed by extracting the statistical information fro...
National audienceThe use of multiple intrusion detection systems (IDSs), security tools and compleme...
Intrusion detection systems are used to monitor information systems, creating large number of alerts...
Grouping and clustering alerts for intrusion detection based on the similarity of features is referr...
Intrusion detection is only a starting step in securing IT infrastructure. Prediction of intrusions ...
International audienceAbstract: The main use of intrusion detection systems (IDS) is to detect attac...
The need for higher-level reasoning capabilities beyond low-level sensor abilities has prompted rese...
In this paper, we present AIDA, an analytical framework for processing intrusion detection alerts wi...
To keep up with the increasing prevalence of cybersecurity attacks, improvements in the current prev...
A security alert fusion algorithm based on temporal scenario recognition is proposed. Known attack p...
International audienceAlert correlation plays an increasingly crucial role in nowadays computer secu...
To support information security, organizations deploy Intrusion Detection Systems (IDS) that monitor...
The tremendous increase in usage and complexity of modern communication and network systems connecte...
For years, intrusion detection has been considered a key component of many organizations’ network de...
Cybersecurity adopts data mining for its ability to extract concealed and indistinct patterns in the...
Security and protection of information is an ever-evolving process in the field of information secur...
National audienceThe use of multiple intrusion detection systems (IDSs), security tools and compleme...
Intrusion detection systems are used to monitor information systems, creating large number of alerts...
Grouping and clustering alerts for intrusion detection based on the similarity of features is referr...
Intrusion detection is only a starting step in securing IT infrastructure. Prediction of intrusions ...
International audienceAbstract: The main use of intrusion detection systems (IDS) is to detect attac...
The need for higher-level reasoning capabilities beyond low-level sensor abilities has prompted rese...
In this paper, we present AIDA, an analytical framework for processing intrusion detection alerts wi...
To keep up with the increasing prevalence of cybersecurity attacks, improvements in the current prev...
A security alert fusion algorithm based on temporal scenario recognition is proposed. Known attack p...
International audienceAlert correlation plays an increasingly crucial role in nowadays computer secu...
To support information security, organizations deploy Intrusion Detection Systems (IDS) that monitor...
The tremendous increase in usage and complexity of modern communication and network systems connecte...
For years, intrusion detection has been considered a key component of many organizations’ network de...
Cybersecurity adopts data mining for its ability to extract concealed and indistinct patterns in the...
Security and protection of information is an ever-evolving process in the field of information secur...
National audienceThe use of multiple intrusion detection systems (IDSs), security tools and compleme...
Intrusion detection systems are used to monitor information systems, creating large number of alerts...
Grouping and clustering alerts for intrusion detection based on the similarity of features is referr...