Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/5022
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHubballi, Neminathen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:36:31Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:36:31Z-
dc.date.issued2014-
dc.identifier.citationHubballi, N., & Suryanarayanan, V. (2014). False alarm minimization techniques in signature-based intrusion detection systems: A survey. Computer Communications, 49, 1-17. doi:10.1016/j.comcom.2014.04.012en_US
dc.identifier.issn0140-3664-
dc.identifier.otherEID(2-s2.0-84903312615)-
dc.identifier.urihttps://doi.org/10.1016/j.comcom.2014.04.012-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/5022-
dc.description.abstractA network based Intrusion Detection System (IDS) gathers and analyzes network packets and report possible low level security violations to a system administrator. In a large network setup, these low level and partial reports become unmanageable to the administrator resulting in some unattended events. Further it is known that state of the art IDS generate many false alarms. There are techniques proposed in IDS literature to minimize false alarms, many of which are widely used in practice in commercial Security Information and Event Management (SIEM) tools. In this paper, we review existing false alarm minimization techniques in signature-based Network Intrusion Detection System (NIDS). We give a taxonomy of false alarm minimization techniques in signature-based IDS and present the pros and cons of each class. We also study few of the prominent commercial SIEM tools which have implemented these techniques along with their performance. Finally, we conclude with some directions to the future research. © 2014 Elsevier B.V. All rights reserved.en_US
dc.language.isoenen_US
dc.publisherElsevieren_US
dc.sourceComputer Communicationsen_US
dc.subjectAlarm systemsen_US
dc.subjectComputer crimeen_US
dc.subjectCorrelation methodsen_US
dc.subjectIntrusion detectionen_US
dc.subjectFalse alarmsen_US
dc.subjectIntrusion Detection Systemsen_US
dc.subjectMinimization techniquesen_US
dc.subjectNetwork based intrusion detection systemsen_US
dc.subjectSecurity information and event management (SIEM)en_US
dc.subjectSecurity violationsen_US
dc.subjectSignature-based network intrusion detection systemsen_US
dc.subjectSystem administratorsen_US
dc.subjectErrorsen_US
dc.titleFalse alarm minimization techniques in signature-based intrusion detection systems: A surveyen_US
dc.typeReviewen_US
dc.rights.licenseAll Open Access, Green-
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: