Online Intrusion Alert Aggregation with Generative Data Stream Modeling
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2014, Vol 4, Issue 7
Abstract
Online intrusion alert aggregation with generative data stream modeling is a approach which uses generative modeling. It also use a method called as probabilistic methods. It can be assume that instances of an attack is similar as a process may be a random process which is producing alerts. This paper aims at collecting and modeling these attacks on some similar parameters, so that attack from beginning to completion can be identified. This collected and modeled alerts is given to security personnel to estimate conclusion and take relative action. With some data sets, we show that it is easy to deduct number of alerts and count of missing meta alerts is also extremely low. Also we demonstrate that generation of meta alerts having delay of only few seconds even after first alert is produced already.
Authors and Affiliations
Kothawale Ganesh S , Borhade Sushama R , Prof. B. Raviprasad
Intrusion Detection and Forensics based on decision tree and Association rule mining for Probe attack detection
This paper present an approach based on the combination of, two techniques using decision tree and Association rule mining for Probe attack detection. This approach proves to be better than the traditional appr...
Image Compression using Hybrid Transform Coding
Image compression is the one of the demand in the current trend to reduce the transmission bandwidth and the storage memory. In this paper we are proposing a hybrid compression technique for image using discr...
A Proposed REBA on Small Scale Forging Industry
Musculoskeletal disorders (MSDs) are common health problem throughout the world. Work related musculoskeletal disorders are group of painful disorders of muscles, tendons and nerves. The low back or lumber area, serves a...
Network Forensic Investigation of HTTPS Protocol
Nowadays a large amount of personal and business transactions are done electronically through secured internet communication with HTTPS Protocol. The internet offers computer users access to a wealth of informati...
A Survey on Different Clustering Algorithms in Data Mining Technique
ABSTRACT: Fast retrieval of the relevant information from databases has always been a significant issue. There are many techniques are developed for this purpose; In among data clustering is one of the major techn...