Automated Verification Methodology of Security Events Based on Heuristic Analysis
We present an automated verification methodology of the security events, that is, IDS alerts, based on heuristic analysis. The proposed verification methodology aims to automatically identify real cyberattacks from the security events and filter out false positive, so that the security analyst is ab...
Saved in:
| Main Authors: | Jungsuk Song, Younsu Lee, Kyuil Kim, Seokhun Kim, SooKyun Kim, Sang-Soo Choi |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2015-09-01
|
| Series: | International Journal of Distributed Sensor Networks |
| Online Access: | https://doi.org/10.1155/2015/817918 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Automated configuration,simulation and verification platform for event-driven home automation IoT system
by: Qiuping ZHANG, et al.
Published: (2019-09-01) -
Automated Runtime Verification of Security for E-Commerce Smart Contracts
by: Yang Liu, et al.
Published: (2025-04-01) -
Design and Implementation of Runtime Verification Framework for Cyber-Physical Production Systems
by: Sungjoo Kang, et al.
Published: (2019-01-01) -
On Heuristics for Parsing-based Verification of Hierarchical Plans with a Goal Task
by: Simona Ondrčková, et al.
Published: (2022-05-01) -
Verification of Energy Usage Based on Standard Building Model Development of Low-Rise Residential Buildings in South Korea
by: KyungSoo Kim, et al.
Published: (2021-01-01)