-
1
-
-
84860970487
-
-
Accessed on Feb. 4, 2004
-
checkrootkit. http://www.checkrootkit.org. Accessed on Feb. 4, 2004.
-
-
-
-
2
-
-
84860970905
-
-
Accessed on Oct 10, 2003
-
Javabayes. http://www-2.cs.cmu.edu/~javabayes/Home/. Accessed on Oct 10, 2003.
-
-
-
-
3
-
-
84860970915
-
-
Accessed on Feb. 4, 2004
-
Nessus. http://www.nessus.org. Accessed on Feb. 4, 2004.
-
-
-
-
4
-
-
84860970914
-
-
Accessed on April 4, 2004
-
Samhain. http://la-samhna.de/samhain/. Accessed on April 4, 2004.
-
-
-
-
5
-
-
84860970495
-
-
Accessed on Feb. 4, 2004
-
Tripwire. http://www.tripwire.com. Accessed on Feb. 4, 2004.
-
-
-
-
6
-
-
0038687692
-
Scalable, graph-based network vulnerability analysis
-
November
-
P. Ammann, D. Wijesekera, and S. Kaushik. Scalable, graph-based network vulnerability analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 217-224, November 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
12
-
-
84947561772
-
Aggregation and correlation of intrusion-detection alerts
-
LNCS 2212
-
H. Debar and A. Wespi. Aggregation and correlation of intrusion-detection alerts. In Recent Advances in Intrusion Detection, LNCS 2212, pages 85 - 103, 2001.
-
(2001)
Recent Advances in Intrusion Detection
, pp. 85-103
-
-
Debar, H.1
Wespi, A.2
-
13
-
-
0036090387
-
STATL: An attack language for state-based intrusion detection
-
S.T. Eckmann, G. Vigna, and R.A. Kemmerer. STATL: An Attack Language for State-based Intrusion Detection. Journal of Computer Security, 10(1/2):71-104, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 71-104
-
-
Eckmann, S.T.1
Vigna, G.2
Kemmerer, R.A.3
-
16
-
-
0003448310
-
-
Statistics for Engineering and Information Science. Springer
-
F.V. Jensen. Bayesian Networks and Decision Graphs. Statistics for Engineering and Information Science. Springer, 2001.
-
(2001)
Bayesian Networks and Decision Graphs
-
-
Jensen, F.V.1
-
20
-
-
77956988169
-
M2D2: A formal data model for IDS alert correlation
-
B. Morin, L. Me, H. Debar, and M. Ducassé. M2D2: A formal data model for IDS alert correlation. In Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), pages 115-137, 2002.
-
(2002)
Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002)
, pp. 115-137
-
-
Morin, B.1
Me, L.2
Debar, H.3
Ducassé, M.4
-
21
-
-
0038011185
-
Constructing attack scenarios through correlation of intrusion alerts
-
Washington, D.C., November
-
P. Ning, Y. Cui, and D. S Reeves. Constructing attack scenarios through correlation of intrusion alerts. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 245-254, Washington, D.C., November 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 245-254
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
22
-
-
79958186026
-
Building attack scenarios through integration of complementary alert correlation methods
-
February
-
P. Ning, D. Xu, C. Healey, and R. St. Amant. Building attack scenarios through integration of complementary alert correlation methods. In Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS '04), pages 97-111, February 2004.
-
(2004)
Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS '04)
, pp. 97-111
-
-
Ning, P.1
Xu, D.2
Healey, C.3
St. Amant, R.4
-
25
-
-
44049089202
-
Automated generation and analysis of attack graphs
-
May
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J.M. Wing. Automated generation and analysis of attack graphs. In Proceedings of IEEE Symposium on Security and Privacy, May 2002.
-
(2002)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
26
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
S. Staniford, J.A. Hoagland, and J.M. McAlerney. Practical automated detection of stealthy portscans. Journal of Computer Security, 10(1/2): 105-136, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.A.2
McAlerney, J.M.3
-
27
-
-
84860970917
-
-
Tauscan
-
Tauscan. http://www.agnitum.com/products/tauscan/.
-
-
-
-
30
-
-
84860970913
-
-
X-scan
-
X-scan. http://www.xfocus.org.
-
-
-
-
31
-
-
21644435323
-
Reasoning about complementary intrusion evidence
-
Department of Computer Science, North Carolina State University
-
Y. Zhai, P. Ning, P. Iyer, and D.S. Reeves. Reasoning about complementary intrusion evidence. Technical Report TR-2004-25, Department of Computer Science, North Carolina State University, 2004.
-
(2004)
Technical Report
, vol.TR-2004-25
-
-
Zhai, Y.1
Ning, P.2
Iyer, P.3
Reeves, D.S.4
|