Item 10203/359

Cited 22 time in webofscience Cited 0 time in scopus
  • Hit : 1009
  • Download : 142
DC FieldValueLanguage
dc.contributor.authorLee, Sko
dc.contributor.authorChung, Bko
dc.contributor.authorKim, Hko
dc.contributor.authorLee, Yko
dc.contributor.authorPark, Cko
dc.contributor.authorYoon, Hyunsooko
dc.date.accessioned2007-05-25T07:58:49Z-
dc.date.available2007-05-25T07:58:49Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2006-05-
dc.identifier.citationCOMPUTERS & SECURITY, v.25, no.3, pp.169 - 183-
dc.identifier.issn0167-4048-
dc.identifier.urihttp://hdl.handle.net/10203/359-
dc.description.abstractWith the growing deployment of networks and the Internet, the importance of network security has increased. Recently, however, systems that detect intrusions, which are important in security countermeasures, have been unable to provide proper analysis or an effective defense mechanism. Instead, they have overwhelmed human operators with a large volume of intrusion detection alerts. This paper presents a fast and efficient system for analyzing alerts. Our system basically depends on the probabilistic correlation. However, we enhance the probabilistic correlation by applying more systematically defined similarity functions and also present a new correlation component that is absent in other correlation models. The system can produce meaningful information by aggregating and correlating the large volume of alerts and can detect Large-scale attacks such as distributed denial of service (DDoS) in early stage. We measured the processing rate of each elementary component and carried out a scenario-based test in order to analyze the efficiency of our system. Although the system is still imperfect, we were able to reduce the numerous redundant alerts 5.5% of the original volume without distorting the meaning through two-phase reduction. This ability reduces the management overhead drastically and makes the analysis and correlation easy. Moreover, we were able to construct attack scenarios for multistep attacks and detect large-scale attacks in real time. (C) 2005 Elsevier Ltd. All rights reserved.-
dc.description.sponsorshipThis work was supported by the Korea Science and Engineering Foundation (KOSEF) through the advanced Information Technology Research Center (AITrc) and University IT Research Center Project.en
dc.languageEnglish-
dc.language.isoen_USen
dc.publisherELSEVIER ADVANCED TECHNOLOGY-
dc.typeArticle-
dc.identifier.wosid000238604700015-
dc.identifier.scopusid2-s2.0-33646899894-
dc.type.rimsART-
dc.citation.volume25-
dc.citation.issue3-
dc.citation.beginningpage169-
dc.citation.endingpage183-
dc.citation.publicationnameCOMPUTERS & SECURITY-
dc.identifier.doi10.1016/j.cose.2005.09.004-
dc.embargo.liftdate9999-12-31-
dc.embargo.terms9999-12-31-
dc.contributor.localauthorYoon, Hyunsoo-
dc.contributor.nonIdAuthorLee, S-
dc.contributor.nonIdAuthorChung, B-
dc.contributor.nonIdAuthorKim, H-
dc.contributor.nonIdAuthorLee, Y-
dc.contributor.nonIdAuthorPark, C-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorsecurity-
dc.subject.keywordAuthorintrusion detection-
dc.subject.keywordAuthorcorrelation-
dc.subject.keywordAuthoralert analysis-
dc.subject.keywordAuthorreduction-
dc.subject.keywordAuthorattack scenario-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 22 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0