Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering》 2007-21
Add to Favorite Get Latest Update

Correlation and Analysis of Intrusion Alerts Based on ClusteringAlgorithm and Alerts’ Prerequisite-consequence Attribute

WU Zheng-zhen1,CHEN Xiu-zhen2,LI Jian-hua1,2(1.Department of Electronical Engineering,Shanghai Jiaotong University,Shanghai 200240;2.Department of Information Security and Engineering,Shanghai Jiaotong University,Shanghai 200240)  
After analysing the clustering algorithm and alerts’ prerequisite-consequence attributes,a novel approach of correlating and analysing intrusion alerts based on the combination of both is proposed.Experimental result on DARPA 2000 dataset proves that this approach can pre-process alerts successfully.Compared with the result of using only the prerequisite-consequence alert correlation method,the proposed approach can successfully eliminate three correlation errors,thus improve the efficiency of the correlation.
【Fund】: 国家“863”计划基金资助项目(2005AA145110 2002AA145090)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 1 Hits
1 YAN Xuan-hui (School of Mathematics and Computer Science,Fujian Normal University,Fuzhou,Fujian 350007,China);An Artificial Immune-Based Intrusion Detection Model Using Vaccination Strategy[J];Acta Electronica Sinica;2009-04
【Citations】
Chinese Journal Full-text Database 1 Hits
1 YE Fang, WU Zhong-fu,LIU Yong-guo ( Department of Computer Science, Chongqing University, Chongqing 400030,China);Clustering Detection Algorithms for Network Intrusions[J];Journal of Chongqing University(Natural Science Edition);2004-03
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 LI Wei-ping ZHANG Zhi-hong1 (1 Zhengzhou university 450002,Zhengzhou;2 Anyang institute of technology,Anyang 455000,China);Application of Cluster Method Based on Gravity Theory[J];Journal of Anyang Institute of Technology;2006-04
2 LI Xiao-ning1,LI Xiao-feng2 (1.College of of Computer Science and Technology,Changchun Normal University,Changchun 130032,China;2.Public Computer Teaching and Research Center,Jilin University,Changchun 130025,China);Application Research on Spatial Clustering in Precision Fertilization[J];Journal of Changchun Normal University(Humanities and Social Sciences);2008-10
3 YANG Bo,LONG Peng-fei(College of Computer and Communication Engineering,Changsha University of Science and Technology,Changsha 410076,China);Application of Agglomerate Layered Clustering Arithmetic in Intrusion Detection[J];Journal of Changsha University of Electric Power(Natural Science);2005-03
4 HUANG Li-wen (School of Science, Quanzhou Normal University, Quanzhou 362000, China);Cluster Anlaysis Methods of Data Mining[J];Computer Knowledge and Technology;2008-12
5 LIU Min-xian(1.School of Computer Science,China University of Mining and Technilogy,XuZhou 221008,China;2.Modern Educational Technology Center,Xuzhou Normal University,Xuzhou 221116,China);Clustering Algorithm in Insurance Profession Utilization and Analysis[J];Computer Knowledge and Technology;2009-11
6 YU Xiao-rong,GUO Chang-yan(Jiangsu University of Science and Technology,Zhenjiang 212003,China);An Intrusion Detection System Based on Decision Support Vector Machine[J];Computer Knowledge and Technology;2011-11
7 LU Gang~1, HUI Huai-hai~2, BU Jia-jun~2, CHEN Chun~2(1.Department of Computer , HangZhou Poly Technique College,Hangzhou 310012,China;2.College of Computer Science, Zhejiang University,Hangzhou 310027, China);Intelligent Locking in Collaborative Pattern Design Based on Forecast[J];Journal of Chongqing University(Natural Science Edition);2005-05
8 ZHOU Ying1,2,SUN Ming-song1(1.Computer Science & Technology College,Harbin Univ.Sci.Tech.,Harbin 150080,China;2.Hulan College,Harbin Normal University,Harbin 150500,China);The Network Intrusion Detection System Model Based on Clustering[J];Journal of Harbin University of Science and Technology;2007-01
9 HUANG Qin;LIAO Wei;LIU Yi-Liang;LI Nan;YANG Jie School of Automation, Chongqing University, Chongqing 400044;Study on Defense against a SYN-Flooding Attack[J];Computer Science;2005-10
10 CHEN Huan HUANG De-cai(College of Computer Science & Technology,Zhejiang University of Technology,Hangzhou 310023,China);Missing Data Imputation Based on Generalized Mahalanobis Distance[J];Computer Science;2011-05
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 Wang Song - he Ren Lian - xing;Intrusion Detection System (IDS) And Intrusion Prevention Systcm(IPS)[J];Journal of Anhui Vocational College of Electrontcs & Information Technology;2004-Z1
2 JIA Bing-jing,WANG Chuan-an,WANG Ya-jun,WU Chang-qin(College of Science,Anhui Science and Technology University,Fengyang 233100,China);Fussy C-means Clustering in Web Log Mining[J];Journal of Eastern Liaoning University(Natural Science);2011-01
3 YANG De-zhi(Teacher's College,Eastern Liaoning University,Dandong 118003);Intelligent Calibration of LS-SVM with QPSO-based Parameter Optimization[J];Journal of Eastern Liaoning University(Natural Science);2011-03
4 Li Jiachun Li Zhitang Li Jiachun Doctoral Candidate; College of Computer Sci. & Tech., Huazhong Univ. of Sci. & Tech., Wuhan 430074, China.;The model of plan recognition for intrusion detection[J];Journal of Huazhong University of Science and Technology;2004-03
5 Li Tie Liu Weiguo Wang Jingjing(The Army 91550,Dalian 116023);Analyzing Research for the Defend Measure of the Network Safety[J];Ship Electronic Engineering;2006-03
6 Han Xuedong, Hong Bingrong, and Meng Wei(School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001);An Immune Genetic Algorithm Based on Vaccine Autonomous Obtaining and Updating[J];Journal of Computer Research and Development;2005-05
7 Mu Chengpo, Huang Houkuan, and Tian Shengfeng (School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044);A Survey of Intrusion-Detection Alert Aggregation and Correlation Techniques[J];Journal of Computer Research and Development;2006-01
8 Liu Yuling,Du Ruizhong,Zhao Weidong,and Cai Hongyun(College of Mathematics and Computer,Hebei University,Baoding 071002);BPCRISM:A New Intrusion Scenario Building Model[J];Journal of Computer Research and Development;2007-04
9 YU Yan-feng ZHANG Shu-jie LV Luo-wen (College of Computer Science,Beijing University of Technology,Beijing 100022);Multilevel Fusion Model of INFOSEC Alert[J];Computer Engineering and Applications;2006-29
10 YAN Xuan-hui. School of Mathematics and Computer Science,Fujian Normal University,Fuzhou 350007,China;Improvement of antibody/antigen coding in immune intrusion detection model.[J];Computer Engineering and Applications;2007-31
【Secondary References】
Chinese Journal Full-text Database 10 Hits
1 Chai Zhengyi~(* **), Zheng Liping~*, Zhu Sifeng~(**) (* School of Information Science and Engineering, Henan University of Technology, Zhengzhou 450001) (** School of Computer Science and Technology, Xidian University, Xi' an 710071);Quantitative assessment of network intrusion risk based on immune antibody concentration[J];Chinese High Technology Letters;2010-10
2 Liu Ning,Zhao Jianhua (Department of Computer Science,ShangLuo University,Shangluo 726000,China);An intrusion detection system based on biological immune for wireless sensor network[J];Journal of Guilin University of Electronic Technology;2011-02
3 LI Cheng-yun,WU Xiang(Naval Headquarters,Beijing 100841,china);Vaccine Mechanism in Network Intrusion Detection System[J];Computer Knowledge and Technology;2012-25
4 JIANG Chao(School of Mathematics,Jilin Normal University,Siping 136000,China);DoS attack detecting algorithm based on immune principle in WSNs[J];Transducer and Microsystem Technologies;2013-01
5 YUAN Gui-li,XUE Yan-guang,LIU Ji-zhen,ZHANG Jian(School of Control and Computer Engineering,North China Electric Power University, Beijing 102206,China);PID Parameter Optimization for Main Steam Temperature Control System Based on Immune Vaccine Algorithm[J];Journal of Chinese Society of Power Engineering;2013-04
6 ZHANG Ling;BAI Zhong-ying;XIE Kang;School of Computer Science,Beijing University of Posts and Telecommunications;Zhengzhou University of Light Industry;Shandong University;;Dynamic Intrusion Detections with Vaccination[J];Journal of Beijing University of Posts and Telecommunications;2014-S1
7 Wang Yuliang;Wen Weimin;Zhao Shenghui;;On Detection Mechanism of WSNs Lightweight Immune Intrusion[J];Journal of Chuzhou University;2014-02
8 Fan Xiao-shi;Lei Ying-jie;Wang Ya-nan;Guo Xin-peng;Air and Missile Defense College, Air Force Engineering University;;Intuitionistic Fuzzy Reasoning Method in Traffic Anomaly Detection[J];Journal of Electronics & Information Technology;2015-09
9 LIU Ning,ZHAO Jianhua Department of Computer Science,Shangluo University,Shangluo,Shaanxi 726000,China;Applying immune theory to intrusion detection system for wireless sensor network[J];Computer Engineering and Applications;2011-15
10 ZHANG Zhi-hui,TIAN Yu-ling,YUAN Xing-fang(College of Computer Science and Technology,Taiyuan University of Technology,Taiyuan 030024,China);Immune Algorithm Based on Grading Memory Strategy[J];Computer Engineering;2011-18
【Secondary Citations】
Chinese Journal Full-text Database 2 Hits
1 RONG Qiu-sheng,YAN Jun-biao,GUO Guo-qiang (Department of Computer Science and Technology,Hunan University of Arts and Sciences,Changde Hunan 415000,China);Research and Implementation of Clustering Algorithm Based on DBSCAN[J];Computer Applications;2004-04
2 LI Jia-chun,LI Zhi-tang (Computer School of Huazhong University of Sci.& Tec.,Wuhan Hubei 430074,China);Promising Intrusion Detection System[J];Application Research of Computers;2001-12
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved