International audienceProbabilistic graphical models are very powerful modeling and reasoning tools. In this paper, we propose efficient Bayesian network-based approaches for two major problems in alert correlation which plays an important role in nowadays computer security infrastructures. While the use of multiple intrusion detection systems (IDSs) and complementary approaches is highly recommended to improve the overall detection rates, this inevitably rises huge amounts of alerts most of which are redundant and false alarms. The aim of this work is twofold: Firstly, we propose an approach based on Bayesian multi-nets which allow to take advantage of local influence relationships in order to improve the prediction of severe attacks. Seco...
It will effectively reduce the cost of development and maintenance in order to detect and predict se...
Modern computer systems are plagued by security vulnerabilities and flaws on many levels. Those vuln...
Security is one of the major issues in any network and on the Internet. It encapsulates many differe...
National audienceThe use of multiple intrusion detection systems (IDSs), security tools and compleme...
International audienceAlert correlation plays an increasingly crucial role in nowadays computer secu...
Most intrusion detection systems available today are using a single audit source for detection, even...
Abstract—Attacks to information systems are becoming more sophisticated and traditional algorithms s...
Abstract: Computer Network Security has become a critical and important issue due to ever increasing...
Attacks to information systems are becoming moresophisticated and traditional algorithms supporting ...
Attacks to information systems are becoming moresophisticated and traditional algorithms supporting ...
The aim of this paper is to explore the effectiveness of Bayesian classifiers in intrusion detection...
The aim of this paper is to explore the effectiveness of Bayesian classifiers in intrusion detection...
Cybersecurity threats have surged in the past decades. Experts agree that conventional security meas...
Capturing the uncertain aspects in cyber security is important for security analysis in enterprise n...
Cybersecurity threats have surged in the past decades. Experts agree that conventional security meas...
It will effectively reduce the cost of development and maintenance in order to detect and predict se...
Modern computer systems are plagued by security vulnerabilities and flaws on many levels. Those vuln...
Security is one of the major issues in any network and on the Internet. It encapsulates many differe...
National audienceThe use of multiple intrusion detection systems (IDSs), security tools and compleme...
International audienceAlert correlation plays an increasingly crucial role in nowadays computer secu...
Most intrusion detection systems available today are using a single audit source for detection, even...
Abstract—Attacks to information systems are becoming more sophisticated and traditional algorithms s...
Abstract: Computer Network Security has become a critical and important issue due to ever increasing...
Attacks to information systems are becoming moresophisticated and traditional algorithms supporting ...
Attacks to information systems are becoming moresophisticated and traditional algorithms supporting ...
The aim of this paper is to explore the effectiveness of Bayesian classifiers in intrusion detection...
The aim of this paper is to explore the effectiveness of Bayesian classifiers in intrusion detection...
Cybersecurity threats have surged in the past decades. Experts agree that conventional security meas...
Capturing the uncertain aspects in cyber security is important for security analysis in enterprise n...
Cybersecurity threats have surged in the past decades. Experts agree that conventional security meas...
It will effectively reduce the cost of development and maintenance in order to detect and predict se...
Modern computer systems are plagued by security vulnerabilities and flaws on many levels. Those vuln...
Security is one of the major issues in any network and on the Internet. It encapsulates many differe...