-
arXiv:cs/0604026 [pdf, ps, other]
APHRODITE: an Anomaly-based Architecture for False Positive Reduction
Abstract: We present APHRODITE, an architecture designed to reduce false positives in network intrusion detection systems. APHRODITE works by detecting anomalies in the output traffic, and by correlating them with the alerts raised by the NIDS working on the input traffic. Benchmarks show a substantial reduction of false positives and that APHRODITE is effective also after a "quick setup", i.e. in the rea… ▽ More
Submitted 7 April, 2006; originally announced April 2006.
Report number: TR-CTIT-06-13
-
arXiv:cs/0603129 [pdf, ps, other]
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements
Abstract: In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most important ones. We propose to link explicitly security requirements with the organization's business… ▽ More
Submitted 31 March, 2006; originally announced March 2006.
Report number: TR-CTIT-06-08
-
arXiv:cs/0511043 [pdf, ps, other]
Poseidon: a 2-tier Anomaly-based Intrusion Detection System
Abstract: We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system. Our benchmarks on the 1999 DARPA data set show a higher detection rate and lower number of false positives than PAYL and PHAD.
Submitted 3 February, 2006; v1 submitted 11 November, 2005; originally announced November 2005.
Report number: TR-CTIT-05-53