Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/5022
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hubballi, Neminath | en_US |
dc.date.accessioned | 2022-03-17T01:00:00Z | - |
dc.date.accessioned | 2022-03-17T15:36:31Z | - |
dc.date.available | 2022-03-17T01:00:00Z | - |
dc.date.available | 2022-03-17T15:36:31Z | - |
dc.date.issued | 2014 | - |
dc.identifier.citation | Hubballi, N., & Suryanarayanan, V. (2014). False alarm minimization techniques in signature-based intrusion detection systems: A survey. Computer Communications, 49, 1-17. doi:10.1016/j.comcom.2014.04.012 | en_US |
dc.identifier.issn | 0140-3664 | - |
dc.identifier.other | EID(2-s2.0-84903312615) | - |
dc.identifier.uri | https://doi.org/10.1016/j.comcom.2014.04.012 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/5022 | - |
dc.description.abstract | A network based Intrusion Detection System (IDS) gathers and analyzes network packets and report possible low level security violations to a system administrator. In a large network setup, these low level and partial reports become unmanageable to the administrator resulting in some unattended events. Further it is known that state of the art IDS generate many false alarms. There are techniques proposed in IDS literature to minimize false alarms, many of which are widely used in practice in commercial Security Information and Event Management (SIEM) tools. In this paper, we review existing false alarm minimization techniques in signature-based Network Intrusion Detection System (NIDS). We give a taxonomy of false alarm minimization techniques in signature-based IDS and present the pros and cons of each class. We also study few of the prominent commercial SIEM tools which have implemented these techniques along with their performance. Finally, we conclude with some directions to the future research. © 2014 Elsevier B.V. All rights reserved. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Elsevier | en_US |
dc.source | Computer Communications | en_US |
dc.subject | Alarm systems | en_US |
dc.subject | Computer crime | en_US |
dc.subject | Correlation methods | en_US |
dc.subject | Intrusion detection | en_US |
dc.subject | False alarms | en_US |
dc.subject | Intrusion Detection Systems | en_US |
dc.subject | Minimization techniques | en_US |
dc.subject | Network based intrusion detection systems | en_US |
dc.subject | Security information and event management (SIEM) | en_US |
dc.subject | Security violations | en_US |
dc.subject | Signature-based network intrusion detection systems | en_US |
dc.subject | System administrators | en_US |
dc.subject | Errors | en_US |
dc.title | False alarm minimization techniques in signature-based intrusion detection systems: A survey | en_US |
dc.type | Review | en_US |
dc.rights.license | All Open Access, Green | - |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: