A survey on IDS alerts processing techniques

  • Authors:
  • Safaa O. Al-Mamory;Hong Li Zhang

  • Affiliations:
  • School of Computer Science, Harbin Institute of Technology, Harbin, China;School of Computer Science, Harbin Institute of Technology, Harbin, China

  • Venue:
  • ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

When an attacker tries to penetrate the network, there are many defensive systems, including intrusion detection systems (IDSs). Most IDSs are capable of detecting many attacks, but can not provide a clear idea to the analyst because of the huge number of false alerts generated by these systems. This weakness in the IDS has led to the emergence of many methods in which to deal with these alerts, minimize them and highlight the real attacks. It has come to a stage to take a stock of the research results a comprehensive view so that further research in this area will be motivated objectively to fulfill the gaps exists till now.