Survey of results in IDS literature: Difference between revisions
AbdelRahman (talk | contribs) |
AbdelRahman (talk | contribs) No edit summary |
||
(2 intermediate revisions by the same user not shown) | |||
Line 2: | Line 2: | ||
Intrusion Detection Evaluation: | Intrusion Detection Evaluation: | ||
* Measuring intrusion detection capability: an information-theoretic approach - 2006 (10-2) | * [http://delivery.acm.org.proxy.library.carleton.ca/10.1145/1130000/1128834/p90-gu.pdf?key1=1128834&key2=1059059921&coll=DL&dl=ACM&ip=134.117.10.200&CFID=11485319&CFTOKEN=70964486 Measuring intrusion detection capability: an information-theoretic approach] - 2006 (10-2) | ||
** Provides an in-depth analysis of traditional metrics. | ** Provides an in-depth analysis of traditional metrics. | ||
** A ratio between the input and output to the entropy of the input | ** A ratio between the input and output to the entropy of the input | ||
* Conceptual Analysis of Intrusion Alarms - 2005 (n/a) | * [http://www.springerlink.com.proxy.library.carleton.ca/content/y5454637051v1t21/fulltext.pdf Conceptual Analysis of Intrusion Alarms] - 2005 (n/a) | ||
** Models alarm correlation techniques as an information retrieval problem. | ** Models alarm correlation techniques as an information retrieval problem. | ||
Latest revision as of 13:52, 7 March 2011
Formatted as Title - Year (# of Citations - # of self Citations)
Intrusion Detection Evaluation:
- Measuring intrusion detection capability: an information-theoretic approach - 2006 (10-2)
- Provides an in-depth analysis of traditional metrics.
- A ratio between the input and output to the entropy of the input
- Conceptual Analysis of Intrusion Alarms - 2005 (n/a)
- Models alarm correlation techniques as an information retrieval problem.
Identifying and Reducing False Alarms:
- Intrusion detection alarms reduction using root cause analysis and clustering - 2009 (n/a)
- Identifying false alarm for network intrusion detection system using data mining and decision tree - 2008 (n/a)
- A memory-based learning approach to reduce false alarms in intrusion detection - 2005 (n/a)
- An improved technique for reducing false alarms due to soft errors - 2006 (1-1)
- False positives reduction via intrusion alert quality framework - 2005 (n/a)
- Minimizing False Alarms on Intrusion Detection for Wireless Sensor Networks in Realistic Environments - 2008 (n/a)
- A use of Bayes' theorem for insight of false alarm rates - 2007 (n/a)
- The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset - 2008 (n/a)
Machine Learning Approaches:
- Detecting Web-Based Attacks by Machine Learning - 2009 (n/a)
- Semi-supervised Learning for False Alarm Reduction - 2010 (n/a)
Others:
- An adaptive automatically tuning intrusion detection system - 2008 (n/a)
- Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees - 2008 (n/a)