Towards adaptive event prioritization for network security - ideas and challenges
نویسنده
چکیده
In the network security domain Intrusion detection systems (IDS) are known for their problems in creating huge amounts of data and especially false positives. Several approaches, originating in the machine learning domain, have been proposed for a better classification. However, threat prioritization has also shown, that a distinction in true and false positives is not always sufficient for a profound security analysis. We therefore propose an approach to combine several aspects from those two areas. On the one hand, threat and event prioritization approaches are rather static with fixed calculation rules, whereas rule learning in alert verification focuses mostly on a binary classification and does not target rule parameters. In this paper we highlight specifics and challenges in event prioritization rules and describe first ideas and challenges towards solutions by the means of automatically learning these aspects.
منابع مشابه
An Action Research on the Book and Child Innovative Event in Order to Improve the Perusal and Reading of Children in Iran
Purpose: One of the most effective ways to promote a culture of reading around the world is to encourage reading in childhood. However, children’s reading faces many challenges, including non-targeted educational policies, increasing children's attention to cyberspace, lack of special libraries, the expensiveness of books, and so on. Traditional measures have not been able to solve the problems...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملPrioritization of Supply Chain Risks in Automotive Industry
Supply chains are constantly exposed to various risks. An incident or uncertain event, which has positive or negative effect on the objectives of a project, is called a risk. According to this identification, analysis and prioritization of risks may have a significant role in the success of the project. The purpose of risk management is to reduce the risks of non-achievement of these object...
متن کاملPrioritization of Supply Chain Risks in Automotive Industry
Supply chains are constantly exposed to various risks. An incident or uncertain event, which has positive or negative effect on the objectives of a project, is called a risk. According to this identification, analysis and prioritization of risks may have a significant role in the success of the project. The purpose of risk management is to reduce the risks of non-achievement of these object...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016