Adaptive Clustering Method for Reclassifying Network Intrusions

@inproceedings{Nehinbe2009AdaptiveCM,
  title={Adaptive Clustering Method for Reclassifying Network Intrusions},
  author={Joshua Ojo Nehinbe},
  booktitle={ISDF},
  year={2009}
}
The problems of classification and reporting of suspicious security violations often degenerate to other complex problems. However, efforts of system administrators to mitigate these flaws by reclassifying intrusive datasets so that realistic attacks can be substantiated are frequently unfruitful with swamped datasets. Also, the urgency required to process alerts has made validations of reduction criteria to be implemented with realistic attacks and unfortunately, these consistently endangering… CONTINUE READING
1 Citations
22 References
Similar Papers

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-10 of 22 references

A Comprehensive approach to Intrusion Detection Alert Correlation

  • F. Valeur, G. Vigna, C. Kruegel, R. A. Kemmerer
  • IEEE Transactions on Dependable and Secure…
  • 2004
Highly Influential
7 Excerpts

Improving the quality of alerts with correlation in intrusion detection

  • L. S. Fatima, A. Mezrioui
  • International Journal of Computer Science and…
  • 2007
Highly Influential
5 Excerpts

Network Security Laboratory

  • R. Sadoddin, A. Ghorbani
  • 2006
Highly Influential
5 Excerpts

Intrusion detection: A survey, Computer Science Department, University of Minnesota

  • L. Aleksandar, K. Vipin, S. Jaidep
  • 2005
Highly Influential
5 Excerpts

Considerations and Pitfalls for Conducting Intrusion Detection Research, International Computer Science Institute and Lawrence Berkeley National Laboratory Berkeley, California USA

  • V. Paxson
  • 2007
2 Excerpts

Similar Papers

Loading similar papers…