Redirigiendo al acceso original de articulo en 20 segundos...
Inicio  /  Applied Sciences  /  Vol: 10 Par: 8 (2020)  /  Artículo
ARTÍCULO
TITULO

Online Mining Intrusion Patterns from IDS Alerts

Kai Zhang    
Shoushan Luo    
Yang Xin    
Hongliang Zhu and Yuling Chen    

Resumen

In this paper, an influence model is proposed to tackle the sequence data analysis problems such as disordering, element missing and random noises. The proposed method can be used for mining intrusion patterns from the intrusion action sequence extracted from IDS (Intrusion Detection System) alerts.

 Artículos similares

       
 
Kashan Ahmed, Ayesha Altaf, Nor Shahida Mohd Jamail, Faiza Iqbal and Rabia Latif    
Modern distributed systems that operate concurrently generate interleaved logs. Identifiers (ID) are always associated with active instances or entities in order to track them in logs. Consequently, log messages with similar IDs can be categorized to aid... ver más
Revista: Applied Sciences

 
Aditya Singhal and Vijay Mago    
The use of Twitter by healthcare organizations is an effective means of disseminating medical information to the public. However, the content of tweets can be influenced by various factors, such as health emergencies and medical breakthroughs. In this st... ver más
Revista: Informatics

 
Hao Wang and Nanfeng Xiao    
In order to better utilize and protect marine organisms, reliable underwater object detection methods need to be developed. Due to various influencing factors from complex and changeable underwater environments, the underwater object detection is full of... ver más
Revista: Applied Sciences

 
Kanza Gulzar, Muhammad Ayoob Memon, Syed Muhammad Mohsin, Sheraz Aslam, Syed Muhammad Abrar Akber and Muhammad Asghar Nadeem    
In the public health sector and the field of medicine, the popularity of data mining and its usage in knowledge discovery and databases (KDD) are rising. The growing popularity of data mining has discovered innovative healthcare links to support decision... ver más
Revista: Information

 
Ibrahim Ba?abbad and Omar Batarfi    
Several malware variants have attacked systems and data over time. Ransomware is among the most harmful malware since it causes huge losses. In order to get a ransom, ransomware is software that locks the victim?s machine or encrypts his personal informa... ver más
Revista: Computers