首页--工业技术论文--自动化技术、计算机技术论文--计算技术、计算机技术论文--计算机的应用论文--计算机网络论文--一般性问题论文

A Comprehensive Vulnerability Based Alert Management Approach

DEDICATION第5-6页
摘要第6-15页
ABSTRACT第15-16页
TABLE OF CONTENTS第18-20页
Figures第20-21页
Tables第21-22页
CHAPTER 1: INTRODUCTION第22-37页
    1.1 Overview第22页
    1.2 Internet and Security第22-24页
    1.3 Introduction of Intrusion Detection Systems (IDSs)第24-30页
        1.3.1 Types of IDSs第25-27页
            1.3.1.1 Anomaly based IDSs第25-26页
            1.3.1.2 Misuse based IDS or Signature based IDSs第26-27页
        1.3.2 Challenges of IDSs第27-30页
    1.4 Motivation第30-34页
    1.5 Major contribution of this thesis第34-36页
    1.6 Organization of thesis第36页
    1.7 Summary第36-37页
Chapter 2:Related Work第37-58页
    2.1 Overview第37页
    2.2 Alert verification based approaches第37-46页
    2.3 Alert correlation based approaches第46-52页
    2.4 Alert classification based approaches第52-57页
    2.5 Summary第57-58页
Chapter 3:Alert Management Framework第58-64页
    3.1 Overview第58页
    3.2 Basic idea of alert management framework第58-60页
    3.3 Detailed design of alert management framework第60-63页
    3.4 Comparison with other frameworks第63页
    3.5 Summary第63-64页
Chapter 4:Alert verification methodology第64-80页
    4.1 Overview第64页
    4.2 EVA data第64-68页
    4.3 IDS Alert-EVA data verifier第68-72页
    4.4 Experiment第72-79页
        4.4.1 Experiment set up第72-73页
        4.4.2 Generating EVA data第73-75页
        4.4.3 Performance evaluation of the verifier component第75-79页
    4.5 Summary第79-80页
Chapter 5:Alert classification methodology第80-99页
    5.1 Overview第80页
    5.2 Alert history第80-82页
    5.3 Computation of alert metrics第82-87页
    5.4 Alert classification第87-92页
        5.4.1 Membership functions第88-89页
        5.4.2 Fuzzy rules第89-92页
    5.5 Experiments and Evaluation第92-98页
    5.6 Summary第98-99页
Chapter 6:Alert merger methodology第99-117页
    6.1 Overview第99页
    6.2 Why the Alert Merger component第99-100页
    6.3 Contents of Meta Alerts第100-101页
    6.4 Merging the unclassified alerts第101-105页
    6.5 Merging the classified alerts第105-108页
    6.6 Additional features第108-109页
    6.7 Experiment and Evaluation第109-116页
        6.7.1 Results-merging the unclassified alerts第109-113页
        6.7.2 Results-merging the classified alerts第113-115页
        6.7.3 Overall performance of the proposed approach第115-116页
    6.8 Summary第116-117页
Conclusion第117-120页
References第120-130页
Acknowledgement第130-131页
Appendix A:Published papers list第131页

论文共131页,点击 下载论文
上一篇:Design and Performance Evaluation of Furrow Opener for Constructing Trapezoidal Shaped Furrow in Permanent Raised Bed Cropping Systems
下一篇:Extraction of Foetus Ecg Signals from Multi Maternal Abdominal Records of Normal Foetuses