Loading…

A Survey on IDS Alerts Classification Techniques

Intrusion detection can be defined as the method of identifying malicious activities that target a network and its resources. The main use of intrusion detection systems (IDS) is to detect attacks against information systems and networks. A main difficulty in the field of intrusion detection is the...

Full description

Saved in:
Bibliographic Details
Published in:International journal of computer applications 2014-01, Vol.105 (12)
Main Authors: Upadhyay, Shashikant, Singh, Rajni Ranjan
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page
container_issue 12
container_start_page
container_title International journal of computer applications
container_volume 105
creator Upadhyay, Shashikant
Singh, Rajni Ranjan
description Intrusion detection can be defined as the method of identifying malicious activities that target a network and its resources. The main use of intrusion detection systems (IDS) is to detect attacks against information systems and networks. A main difficulty in the field of intrusion detection is the organization of alerts. Normally IDS's produced numerous alerts, which cannot provide a clear idea to the analyst about what type of alert occur, which type of alert is generated etc. because of the huge number of alerts generated by these systems. One solution of this problem is classifying the alerts. During this paper, we try to represent an overview of IDS alerts classification techniques.
doi_str_mv 10.5120/18431-9795
format article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_miscellaneous_1651425675</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3528969291</sourcerecordid><originalsourceid>FETCH-LOGICAL-p615-72279f654852d2b2bed6fc78e23f2bd7bbe1b19a4178f711be430c99a1eed96d3</originalsourceid><addsrcrecordid>eNpdjk9Lw0AQxRdRsNRe_AQBL16iO_tndvcYqtZCwUNzL7vJLKbEpGYTwW9vRA_iu7yB9-PNY-wa-J0Gwe_BKgm5M06fsQV3RufWWnP-575kq5SOfJZ0Ap1aMF5k-2n4oM-s77Ltwz4rWhrGlK1bn1ITm8qPzZyUVL12zftE6YpdRN8mWv36kpVPj-X6Od-9bLbrYpefEHRuhDAuolZWi1oEEajGWBlLQkYRahMCQQDnFRgbDUAgJXnlnAei2mEtl-z2p_Y09N9vx8NbkypqW99RP6UDoAYlNBo9ozf_0GM_Dd08bqYkWkS0Tn4B7O1RzA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1636866689</pqid></control><display><type>article</type><title>A Survey on IDS Alerts Classification Techniques</title><source>Freely Accessible Journals</source><creator>Upadhyay, Shashikant ; Singh, Rajni Ranjan</creator><creatorcontrib>Upadhyay, Shashikant ; Singh, Rajni Ranjan</creatorcontrib><description>Intrusion detection can be defined as the method of identifying malicious activities that target a network and its resources. The main use of intrusion detection systems (IDS) is to detect attacks against information systems and networks. A main difficulty in the field of intrusion detection is the organization of alerts. Normally IDS's produced numerous alerts, which cannot provide a clear idea to the analyst about what type of alert occur, which type of alert is generated etc. because of the huge number of alerts generated by these systems. One solution of this problem is classifying the alerts. During this paper, we try to represent an overview of IDS alerts classification techniques.</description><identifier>ISSN: 0975-8887</identifier><identifier>EISSN: 0975-8887</identifier><identifier>DOI: 10.5120/18431-9795</identifier><language>eng</language><publisher>New York: Foundation of Computer Science</publisher><subject>Classification ; Computer information security ; Information systems ; Intrusion ; Mathematical models ; Networks ; Organizations</subject><ispartof>International journal of computer applications, 2014-01, Vol.105 (12)</ispartof><rights>Copyright Foundation of Computer Science 2014</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Upadhyay, Shashikant</creatorcontrib><creatorcontrib>Singh, Rajni Ranjan</creatorcontrib><title>A Survey on IDS Alerts Classification Techniques</title><title>International journal of computer applications</title><description>Intrusion detection can be defined as the method of identifying malicious activities that target a network and its resources. The main use of intrusion detection systems (IDS) is to detect attacks against information systems and networks. A main difficulty in the field of intrusion detection is the organization of alerts. Normally IDS's produced numerous alerts, which cannot provide a clear idea to the analyst about what type of alert occur, which type of alert is generated etc. because of the huge number of alerts generated by these systems. One solution of this problem is classifying the alerts. During this paper, we try to represent an overview of IDS alerts classification techniques.</description><subject>Classification</subject><subject>Computer information security</subject><subject>Information systems</subject><subject>Intrusion</subject><subject>Mathematical models</subject><subject>Networks</subject><subject>Organizations</subject><issn>0975-8887</issn><issn>0975-8887</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><recordid>eNpdjk9Lw0AQxRdRsNRe_AQBL16iO_tndvcYqtZCwUNzL7vJLKbEpGYTwW9vRA_iu7yB9-PNY-wa-J0Gwe_BKgm5M06fsQV3RufWWnP-575kq5SOfJZ0Ap1aMF5k-2n4oM-s77Ltwz4rWhrGlK1bn1ITm8qPzZyUVL12zftE6YpdRN8mWv36kpVPj-X6Od-9bLbrYpefEHRuhDAuolZWi1oEEajGWBlLQkYRahMCQQDnFRgbDUAgJXnlnAei2mEtl-z2p_Y09N9vx8NbkypqW99RP6UDoAYlNBo9ozf_0GM_Dd08bqYkWkS0Tn4B7O1RzA</recordid><startdate>20140101</startdate><enddate>20140101</enddate><creator>Upadhyay, Shashikant</creator><creator>Singh, Rajni Ranjan</creator><general>Foundation of Computer Science</general><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20140101</creationdate><title>A Survey on IDS Alerts Classification Techniques</title><author>Upadhyay, Shashikant ; Singh, Rajni Ranjan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p615-72279f654852d2b2bed6fc78e23f2bd7bbe1b19a4178f711be430c99a1eed96d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Classification</topic><topic>Computer information security</topic><topic>Information systems</topic><topic>Intrusion</topic><topic>Mathematical models</topic><topic>Networks</topic><topic>Organizations</topic><toplevel>online_resources</toplevel><creatorcontrib>Upadhyay, Shashikant</creatorcontrib><creatorcontrib>Singh, Rajni Ranjan</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of computer applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Upadhyay, Shashikant</au><au>Singh, Rajni Ranjan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Survey on IDS Alerts Classification Techniques</atitle><jtitle>International journal of computer applications</jtitle><date>2014-01-01</date><risdate>2014</risdate><volume>105</volume><issue>12</issue><issn>0975-8887</issn><eissn>0975-8887</eissn><abstract>Intrusion detection can be defined as the method of identifying malicious activities that target a network and its resources. The main use of intrusion detection systems (IDS) is to detect attacks against information systems and networks. A main difficulty in the field of intrusion detection is the organization of alerts. Normally IDS's produced numerous alerts, which cannot provide a clear idea to the analyst about what type of alert occur, which type of alert is generated etc. because of the huge number of alerts generated by these systems. One solution of this problem is classifying the alerts. During this paper, we try to represent an overview of IDS alerts classification techniques.</abstract><cop>New York</cop><pub>Foundation of Computer Science</pub><doi>10.5120/18431-9795</doi></addata></record>
fulltext fulltext
identifier ISSN: 0975-8887
ispartof International journal of computer applications, 2014-01, Vol.105 (12)
issn 0975-8887
0975-8887
language eng
recordid cdi_proquest_miscellaneous_1651425675
source Freely Accessible Journals
subjects Classification
Computer information security
Information systems
Intrusion
Mathematical models
Networks
Organizations
title A Survey on IDS Alerts Classification Techniques
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T14%3A12%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Survey%20on%20IDS%20Alerts%20Classification%20Techniques&rft.jtitle=International%20journal%20of%20computer%20applications&rft.au=Upadhyay,%20Shashikant&rft.date=2014-01-01&rft.volume=105&rft.issue=12&rft.issn=0975-8887&rft.eissn=0975-8887&rft_id=info:doi/10.5120/18431-9795&rft_dat=%3Cproquest%3E3528969291%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-p615-72279f654852d2b2bed6fc78e23f2bd7bbe1b19a4178f711be430c99a1eed96d3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1636866689&rft_id=info:pmid/&rfr_iscdi=true