Survey of results in IDS literature: Difference between revisions
AbdelRahman (talk | contribs) Created page with "==Survey Brief Results== Formatted as <i>Title - Year (# of Citations - # of self Citations)</i> Intrusion Detection Evaluation: * Measuring intrusion detection capability: an i…" |
AbdelRahman (talk | contribs) |
||
Line 1: | Line 1: | ||
Formatted as <i>Title - Year (# of Citations - # of self Citations)</i> | Formatted as <i>Title - Year (# of Citations - # of self Citations)</i> | ||
Revision as of 12:50, 7 March 2011
Formatted as Title - Year (# of Citations - # of self Citations)
Intrusion Detection Evaluation:
- Measuring intrusion detection capability: an information-theoretic approach - 2006 (10-2)
- Provides an in-depth analysis of traditional metrics.
- A ratio between the input and output to the entropy of the input
- Conceptual Analysis of Intrusion Alarms - 2005 (n/a)
- Models alarm correlation techniques as an information retrieval problem.
Identifying and Reducing False Alarms:
- Intrusion detection alarms reduction using root cause analysis and clustering - 2009 (n/a)
- Identifying false alarm for network intrusion detection system using data mining and decision tree - 2008 (n/a)
- A memory-based learning approach to reduce false alarms in intrusion detection - 2005 (n/a)
- An improved technique for reducing false alarms due to soft errors - 2006 (1-1)
- False positives reduction via intrusion alert quality framework - 2005 (n/a)
- Minimizing False Alarms on Intrusion Detection for Wireless Sensor Networks in Realistic Environments - 2008 (n/a)
- A use of Bayes' theorem for insight of false alarm rates - 2007 (n/a)
- The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset - 2008 (n/a)
Machine Learning Approaches:
- Detecting Web-Based Attacks by Machine Learning - 2009 (n/a)
- Semi-supervised Learning for False Alarm Reduction - 2010 (n/a)
Others:
- An adaptive automatically tuning intrusion detection system - 2008 (n/a)
- Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees - 2008 (n/a)