Alert correlation

Alert correlation is a type of long analysis. It focuses on the process of clustering alerts (events), generated by NIDS and HIDS computer systems… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2001-2017
0102020012017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2009
2009
Alert correlation is a promising technique in intrusion detection. It takes the alerts produced by intrusion detection systems… (More)
  • figure 2
  • figure 3
  • figure 4
  • table I
  • figure 5
Is this relevant?
2007
2007
This paper reports a research work to address the problem of the large number of alerts generated by the detectors in an… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 4
Is this relevant?
2006
2006
Real-Time Intrusion Detection Alert Correlation 
  • figure 3.1
  • figure 3.2
  • table 3.1
  • figure 3.4
  • table 3.3
Is this relevant?
2006
2006
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Alert correlation is a process that analyzes the alerts produced by one or more intrusion detection systems and provides a more… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Several alert correlation methods were proposed in the past several years to construct high-level attack scenarios from low-level… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and raise alerts independently, though… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
This paper presents the work we have done within the MIRADOR project to design CRIM, a cooperative module for intrusion detection… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
At present, alert correlation techniques do not make full use of the information that is available. We propose a data model for… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?