Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection.
Emilie Lundin BarseErland JonssonPublished in: ACSAC (2004)
Keyphrases
- intrusion detection
- log data
- network intrusion
- data mining techniques
- alert correlation
- network intrusions
- network attacks
- intrusion detection system
- anomaly detection
- network security
- network intrusion detection
- security vulnerabilities
- misuse detection
- information security
- network traffic
- artificial immune
- cyber security
- log files
- high detection rate
- normal behavior
- cyber attacks
- data mining
- dos attacks
- countermeasures
- detecting anomalous
- log analysis
- web access
- network intrusion detection systems
- fraud detection
- association rules
- knowledge discovery
- active learning
- object recognition
- machine learning
- databases
- distributed intrusion detection