Intrusion alert prioritisation and attack detection using post-correlation analysis.
Riyanat O. ShittuAlex HealingRobert A. Ghanea-HercockRobin E. BloomfieldMuttukrishnan RajarajanPublished in: Comput. Secur. (2015)
Keyphrases
- correlation analysis
- attack detection
- attack scenarios
- intrusion detection system
- alert correlation
- intrusion detection
- multistage
- regression analysis
- cluster analysis
- network security
- correlation coefficient
- anomaly detection
- computer networks
- network traffic
- cyber attacks
- factor analysis
- product recommendation
- feature extraction
- databases
- data processing
- data mining