4.6 Article

Online Mining Intrusion Patterns from IDS Alerts

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Survey of Attack Projection, Prediction, and Forecasting in Cyber Security

Martin Husak et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

On the Alert Correlation Process for the Detection of Multi-step Attacks and a Graph-based Realization

Steffen Haas et al.

APPLIED COMPUTING REVIEW (2019)

Article Computer Science, Information Systems

Hidden Markov Models and Alert Correlations for the Prediction of Advanced Persistent Threats

Ibrahim Ghafir et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

An Intrusion Action-Based IDS Alert Correlation Analysis and Prediction Framework

Kai Zhang et al.

IEEE ACCESS (2019)

Article Computer Science, Theory & Methods

A Systematic Mapping Study on Intrusion Alert Analysis in Intrusion Detection Systems

Ali Ahmadian Ramaki et al.

ACM COMPUTING SURVEYS (2018)

Article Computer Science, Information Systems

A systematic survey on multi-step attack detection

Julio Navarro et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Information Systems

A novel kill-chain framework for remote security log analysis with SIEM software

Blake D. Bryant et al.

COMPUTERS & SECURITY (2017)