About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Information Security and Digital Forensics. First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers

Research Article

Adaptive Clustering Method for Reclassifying Network Intrusions

Download(Requires a free EAI acccount)
447 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-11530-1_15,
        author={Nehinbe Joshua},
        title={Adaptive Clustering Method for Reclassifying Network Intrusions},
        proceedings={Information Security and Digital Forensics. First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers},
        proceedings_a={ISDF},
        year={2012},
        month={5},
        keywords={intrusion quarantining intrusion blacklisting intrusion white-listing probing attacks},
        doi={10.1007/978-3-642-11530-1_15}
    }
    
  • Nehinbe Joshua
    Year: 2012
    Adaptive Clustering Method for Reclassifying Network Intrusions
    ISDF
    Springer
    DOI: 10.1007/978-3-642-11530-1_15
Nehinbe Joshua1,*
  • 1: University of Essex
*Contact email: jnehin@essex.ac.uk

Abstract

The problems of classification and reporting of suspicious security violations often degenerate to other complex problems.  However, efforts of system administrators to mitigate these flaws by reclassifying intrusive datasets so that realistic attacks can be substantiated are frequently unfruitful with swamped datasets. Also, the urgency required to process alerts has made validations of reduction criteria to be implemented with realistic attacks and unfortunately, these consistently endangering computer resources on the networks to more exposures. Consequently, the development of computer attacks that have been warned but still succeed is a classical problem in computer security. In this paper therefore, we have implemented a new clustering method to reduce these problems. Also, evaluation that we performed with synthetic and realistic datasets clustered alerts of each dataset to achieve a cluster of white-listed alerts. Moreover, the results obtained have indicated how system administrators could achieve prompt countermeasures to prevent realistic attacks.

Keywords
intrusion quarantining intrusion blacklisting intrusion white-listing probing attacks
Published
2012-05-25
http://dx.doi.org/10.1007/978-3-642-11530-1_15
Copyright © 2009–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL