Dissertation Chapters | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014
Online Intrusion Alert Aggregation with GDSM
Borhade Sushama R, Chandre P.R
Online intrusion alert aggregation with generative data stream modeling uses generative modeling approach. It also uses probabilistic methods as one of the type of method. We assume that instances of an attack is similar as a alert producing process. This process may be a random process. This paper summarizes the process of collecting and modeling these attacks on some similar parameters such as source, destination etc., so that attack from beginning to completion can be identified. This collected and modeled alerts is processed through different types of layers through generative data stream modeling. With some data sets, we will show that it is easy to decrease the number of alerts and count of missing meta alerts is also extremely low. Also we show that generation of meta alerts having delay of only few seconds even though first alert is produced already. Also we send these meta alerts on registered mobile so that admin will get messages as soon as possible.
Keywords: online intrusion detection system, data stream, alert aggregation, IDS, offline alert aggregation, online alert aggregation
Edition: Volume 3 Issue 12, December 2014
Pages: 1664 - 1669
How to Cite this Article?
Borhade Sushama R, Chandre P.R, "Online Intrusion Alert Aggregation with GDSM", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14690, Volume 3 Issue 12, December 2014, 1664 - 1669
93 PDF Views | 97 PDF Downloads
Similar Articles with Keyword 'data stream'
Lightning CEP - Joining on High Velocity Stream
Vikas Kale, Kishor Shedge
Lightning CEP - Designing Filter and Window Operations
Vikas Kale, Kishor Shedge
Multiple Instruction Multiple Data (MIMD) Implementation on Clusters of Terminals
Sudhir Kumar Meesala, Dr. Pabitra Mohan Khilar, Dr. A. K. Shrivastava
A Review on Detection of Outliers Over High Dimensional Streaming Data Using Cluster Based Hybrid Approach
Abhishek B. Mankar, Namrata Ghuse
A Framework On: Decision Tree for Dynamic Uncertain Data
Megha Pimpalkar, Garima Singh
Similar Articles with Keyword 'IDS'
A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN
Implementation and Analysis of DoS Attack Detection Algorithms
Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani
Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques
Snehal B Rase, Pranjali Deshmukh
EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature
Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar
Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System
Hardik M. Shingala, Mukesh Sakle