Loading…
A Survey on IDS Alerts Classification Techniques
Intrusion detection can be defined as the method of identifying malicious activities that target a network and its resources. The main use of intrusion detection systems (IDS) is to detect attacks against information systems and networks. A main difficulty in the field of intrusion detection is the...
Saved in:
Published in: | International journal of computer applications 2014-01, Vol.105 (12) |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | 12 |
container_start_page | |
container_title | International journal of computer applications |
container_volume | 105 |
creator | Upadhyay, Shashikant Singh, Rajni Ranjan |
description | Intrusion detection can be defined as the method of identifying malicious activities that target a network and its resources. The main use of intrusion detection systems (IDS) is to detect attacks against information systems and networks. A main difficulty in the field of intrusion detection is the organization of alerts. Normally IDS's produced numerous alerts, which cannot provide a clear idea to the analyst about what type of alert occur, which type of alert is generated etc. because of the huge number of alerts generated by these systems. One solution of this problem is classifying the alerts. During this paper, we try to represent an overview of IDS alerts classification techniques. |
doi_str_mv | 10.5120/18431-9795 |
format | article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_miscellaneous_1651425675</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3528969291</sourcerecordid><originalsourceid>FETCH-LOGICAL-p615-72279f654852d2b2bed6fc78e23f2bd7bbe1b19a4178f711be430c99a1eed96d3</originalsourceid><addsrcrecordid>eNpdjk9Lw0AQxRdRsNRe_AQBL16iO_tndvcYqtZCwUNzL7vJLKbEpGYTwW9vRA_iu7yB9-PNY-wa-J0Gwe_BKgm5M06fsQV3RufWWnP-575kq5SOfJZ0Ap1aMF5k-2n4oM-s77Ltwz4rWhrGlK1bn1ITm8qPzZyUVL12zftE6YpdRN8mWv36kpVPj-X6Od-9bLbrYpefEHRuhDAuolZWi1oEEajGWBlLQkYRahMCQQDnFRgbDUAgJXnlnAei2mEtl-z2p_Y09N9vx8NbkypqW99RP6UDoAYlNBo9ozf_0GM_Dd08bqYkWkS0Tn4B7O1RzA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1636866689</pqid></control><display><type>article</type><title>A Survey on IDS Alerts Classification Techniques</title><source>Freely Accessible Journals</source><creator>Upadhyay, Shashikant ; Singh, Rajni Ranjan</creator><creatorcontrib>Upadhyay, Shashikant ; Singh, Rajni Ranjan</creatorcontrib><description>Intrusion detection can be defined as the method of identifying malicious activities that target a network and its resources. The main use of intrusion detection systems (IDS) is to detect attacks against information systems and networks. A main difficulty in the field of intrusion detection is the organization of alerts. Normally IDS's produced numerous alerts, which cannot provide a clear idea to the analyst about what type of alert occur, which type of alert is generated etc. because of the huge number of alerts generated by these systems. One solution of this problem is classifying the alerts. During this paper, we try to represent an overview of IDS alerts classification techniques.</description><identifier>ISSN: 0975-8887</identifier><identifier>EISSN: 0975-8887</identifier><identifier>DOI: 10.5120/18431-9795</identifier><language>eng</language><publisher>New York: Foundation of Computer Science</publisher><subject>Classification ; Computer information security ; Information systems ; Intrusion ; Mathematical models ; Networks ; Organizations</subject><ispartof>International journal of computer applications, 2014-01, Vol.105 (12)</ispartof><rights>Copyright Foundation of Computer Science 2014</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Upadhyay, Shashikant</creatorcontrib><creatorcontrib>Singh, Rajni Ranjan</creatorcontrib><title>A Survey on IDS Alerts Classification Techniques</title><title>International journal of computer applications</title><description>Intrusion detection can be defined as the method of identifying malicious activities that target a network and its resources. The main use of intrusion detection systems (IDS) is to detect attacks against information systems and networks. A main difficulty in the field of intrusion detection is the organization of alerts. Normally IDS's produced numerous alerts, which cannot provide a clear idea to the analyst about what type of alert occur, which type of alert is generated etc. because of the huge number of alerts generated by these systems. One solution of this problem is classifying the alerts. During this paper, we try to represent an overview of IDS alerts classification techniques.</description><subject>Classification</subject><subject>Computer information security</subject><subject>Information systems</subject><subject>Intrusion</subject><subject>Mathematical models</subject><subject>Networks</subject><subject>Organizations</subject><issn>0975-8887</issn><issn>0975-8887</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><recordid>eNpdjk9Lw0AQxRdRsNRe_AQBL16iO_tndvcYqtZCwUNzL7vJLKbEpGYTwW9vRA_iu7yB9-PNY-wa-J0Gwe_BKgm5M06fsQV3RufWWnP-575kq5SOfJZ0Ap1aMF5k-2n4oM-s77Ltwz4rWhrGlK1bn1ITm8qPzZyUVL12zftE6YpdRN8mWv36kpVPj-X6Od-9bLbrYpefEHRuhDAuolZWi1oEEajGWBlLQkYRahMCQQDnFRgbDUAgJXnlnAei2mEtl-z2p_Y09N9vx8NbkypqW99RP6UDoAYlNBo9ozf_0GM_Dd08bqYkWkS0Tn4B7O1RzA</recordid><startdate>20140101</startdate><enddate>20140101</enddate><creator>Upadhyay, Shashikant</creator><creator>Singh, Rajni Ranjan</creator><general>Foundation of Computer Science</general><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20140101</creationdate><title>A Survey on IDS Alerts Classification Techniques</title><author>Upadhyay, Shashikant ; Singh, Rajni Ranjan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p615-72279f654852d2b2bed6fc78e23f2bd7bbe1b19a4178f711be430c99a1eed96d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Classification</topic><topic>Computer information security</topic><topic>Information systems</topic><topic>Intrusion</topic><topic>Mathematical models</topic><topic>Networks</topic><topic>Organizations</topic><toplevel>online_resources</toplevel><creatorcontrib>Upadhyay, Shashikant</creatorcontrib><creatorcontrib>Singh, Rajni Ranjan</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of computer applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Upadhyay, Shashikant</au><au>Singh, Rajni Ranjan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Survey on IDS Alerts Classification Techniques</atitle><jtitle>International journal of computer applications</jtitle><date>2014-01-01</date><risdate>2014</risdate><volume>105</volume><issue>12</issue><issn>0975-8887</issn><eissn>0975-8887</eissn><abstract>Intrusion detection can be defined as the method of identifying malicious activities that target a network and its resources. The main use of intrusion detection systems (IDS) is to detect attacks against information systems and networks. A main difficulty in the field of intrusion detection is the organization of alerts. Normally IDS's produced numerous alerts, which cannot provide a clear idea to the analyst about what type of alert occur, which type of alert is generated etc. because of the huge number of alerts generated by these systems. One solution of this problem is classifying the alerts. During this paper, we try to represent an overview of IDS alerts classification techniques.</abstract><cop>New York</cop><pub>Foundation of Computer Science</pub><doi>10.5120/18431-9795</doi></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0975-8887 |
ispartof | International journal of computer applications, 2014-01, Vol.105 (12) |
issn | 0975-8887 0975-8887 |
language | eng |
recordid | cdi_proquest_miscellaneous_1651425675 |
source | Freely Accessible Journals |
subjects | Classification Computer information security Information systems Intrusion Mathematical models Networks Organizations |
title | A Survey on IDS Alerts Classification Techniques |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T14%3A12%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Survey%20on%20IDS%20Alerts%20Classification%20Techniques&rft.jtitle=International%20journal%20of%20computer%20applications&rft.au=Upadhyay,%20Shashikant&rft.date=2014-01-01&rft.volume=105&rft.issue=12&rft.issn=0975-8887&rft.eissn=0975-8887&rft_id=info:doi/10.5120/18431-9795&rft_dat=%3Cproquest%3E3528969291%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-p615-72279f654852d2b2bed6fc78e23f2bd7bbe1b19a4178f711be430c99a1eed96d3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1636866689&rft_id=info:pmid/&rfr_iscdi=true |