Online Intrusion Alert Aggregation with GDSM
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Dissertation Chapters | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

Online Intrusion Alert Aggregation with GDSM

Borhade Sushama R, Chandre P.R

Online intrusion alert aggregation with generative data stream modeling uses generative modeling approach. It also uses probabilistic methods as one of the type of method. We assume that instances of an attack is similar as a alert producing process. This process may be a random process. This paper summarizes the process of collecting and modeling these attacks on some similar parameters such as source, destination etc., so that attack from beginning to completion can be identified. This collected and modeled alerts is processed through different types of layers through generative data stream modeling. With some data sets, we will show that it is easy to decrease the number of alerts and count of missing meta alerts is also extremely low. Also we show that generation of meta alerts having delay of only few seconds even though first alert is produced already. Also we send these meta alerts on registered mobile so that admin will get messages as soon as possible.

Keywords: online intrusion detection system, data stream, alert aggregation, IDS, offline alert aggregation, online alert aggregation

Edition: Volume 3 Issue 12, December 2014

Pages: 1664 - 1669

Share this Article

How to Cite this Article?

Borhade Sushama R, Chandre P.R, "Online Intrusion Alert Aggregation with GDSM", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14690, Volume 3 Issue 12, December 2014, 1664 - 1669

93 PDF Views | 97 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'data stream'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1888 - 1891

Lightning CEP - Joining on High Velocity Stream

Vikas Kale, Kishor Shedge

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1883 - 1887

Lightning CEP - Designing Filter and Window Operations

Vikas Kale, Kishor Shedge

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1652 - 1658

Multiple Instruction Multiple Data (MIMD) Implementation on Clusters of Terminals

Sudhir Kumar Meesala, Dr. Pabitra Mohan Khilar, Dr. A. K. Shrivastava

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1850 - 1856

A Review on Detection of Outliers Over High Dimensional Streaming Data Using Cluster Based Hybrid Approach

Abhishek B. Mankar, Namrata Ghuse

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1403 - 1405

A Framework On: Decision Tree for Dynamic Uncertain Data

Megha Pimpalkar, Garima Singh

Share this Article

Similar Articles with Keyword 'IDS'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2025 - 2030

Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System

Hardik M. Shingala, Mukesh Sakle

Share this Article
Top