메뉴 건너뛰기




Volumn , Issue , 2002, Pages 245-254

Constructing attack scenarios through correlation of intrusion alerts

Author keywords

Alert correlation; Attack scenarios; Intrusion detection

Indexed keywords

COMPUTER CRIME; COMPUTER SIMULATION; DATABASE SYSTEMS; ENCODING (SYMBOLS); JAVA PROGRAMMING LANGUAGE; KNOWLEDGE BASED SYSTEMS; RESPONSE TIME (COMPUTER SYSTEMS); XML;

EID: 0038011185     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/586143.586144     Document Type: Conference Paper
Times cited : (420)

References (18)
  • 1
    • 0004048154 scopus 로고
    • Computer security threat monitoring and surveillance
    • Technical report, James P. Anderson Co., Fort Washington, PA
    • J. P. Anderson. Computer security threat monitoring and surveillance. Technical report, James P. Anderson Co., Fort Washington, PA, 1980.
    • (1980)
    • Anderson, J.P.1
  • 2
    • 84888840768 scopus 로고    scopus 로고
    • GraphViz - Open source graph layout and drawing software
    • AT & T Research Labs.
    • AT & T Research Labs. GraphViz - open source graph layout and drawing software. http://www.research.att.com/sw/tools/graphviz/.
  • 3
    • 0003907293 scopus 로고    scopus 로고
    • Macmillan Technology Publishing
    • R. Bace. Intrusion Detection. Macmillan Technology Publishing, 2000.
    • (2000) Intrusion Detection
    • Bace, R.1
  • 8
    • 56349131318 scopus 로고    scopus 로고
    • RealSecure intrusion detection system
    • ISS, Inc.
    • ISS, Inc. RealSecure intrusion detection system. http://www.iss.net.
  • 10
    • 33846309830 scopus 로고    scopus 로고
    • 2000 DARPA intrusion detection scenario specific datasets
    • MIT Lincoln Lab.
    • MIT Lincoln Lab. 2000 DARPA intrusion detection scenario specific datasets. http://www.11.mit.edu/IST/ideval/data/2000/2000_data_index.html, 2000.
    • (2000)
  • 12
    • 0038011185 scopus 로고    scopus 로고
    • Constructing attack scenarios through correlation of intrusion alerts (full version)
    • Technical Report TR-2002-13, North Carolina State University, Department of Computer Science, August
    • P. Ning, Y. Cui, and D. S. Reeves. Constructing attack scenarios through correlation of intrusion alerts (full version). Technical Report TR-2002-13, North Carolina State University, Department of Computer Science, August 2002.
    • (2002)
    • Ning, P.1    Cui, Y.2    Reeves, D.S.3
  • 13
    • 4243538338 scopus 로고    scopus 로고
    • Adapting query optimization techniques for efficient intrusion alert correlation
    • Technical Report TR-2002-14, North Carolina State University, Department of Computer Scienc, September
    • P. Ning and D. Xu. Adapting query optimization techniques for efficient intrusion alert correlation. Technical Report TR-2002-14, North Carolina State University, Department of Computer Scienc, September 2002.
    • (2002)
    • Ning, P.1    Xu, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.