-
4
-
-
0004225165
-
Intrusion detection message exchange format data model and extensible markup language (xml) document type definition
-
draft-ietf-idwg-idmef-xml-03.txt, Feb.
-
D. Curry and H. Debar. Intrusion detection message exchange format data model and extensible markup language (xml) document type definition. Internet Draft, draft-ietf-idwg-idmef-xml-03.txt, Feb. 2001.
-
(2001)
Internet Draft
-
-
Curry, D.1
Debar, H.2
-
6
-
-
84947561772
-
Aggregation and correlation of intrusion-detection alerts
-
LNCS 2212
-
H. Debar and A. Wespi. Aggregation and correlation of intrusion-detection alerts. In Recent Advances in Intrusion Detection, LNCS 2212, pages 85 - 103, 2001.
-
(2001)
Recent Advances in Intrusion Detection
, pp. 85-103
-
-
Debar, H.1
Wespi, A.2
-
7
-
-
3042821266
-
Validation of sensor alert correlators
-
J. Haines, D. Ryder, L. Tinnel, and S. Taylor. Validation of sensor alert correlators. IEEE Security & Privacy Magazine, 1(1):46-56, 2003.
-
(2003)
IEEE Security & Privacy Magazine
, vol.1
, Issue.1
, pp. 46-56
-
-
Haines, J.1
Ryder, D.2
Tinnel, L.3
Taylor, S.4
-
11
-
-
0004118981
-
The NIDES statistical component: Description and justification
-
SRI International, Mar.
-
H. S. Javitz and A. Valdes. The NIDES statistical component: Description and justification. Technical report, SRI International, Mar. 1994.
-
(1994)
Technical Report
-
-
Javitz, H.S.1
Valdes, A.2
-
12
-
-
3142623031
-
Clustering intrusion detection alarms to support root cause analysis
-
Nov
-
K. Julisch. Clustering intrusion detection alarms to support root cause analysis. ACM Transactions on Information and System Security, 6(4):443-471, Nov 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.4
, pp. 443-471
-
-
Julisch, K.1
-
14
-
-
77956988169
-
M2D2: A formal data model for IDS alert correlation
-
B. Morin, L. Me, H. Debar, and M. Ducassé. M2D2: A formal data model for IDS alert correlation. In Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), pages 115-137, 2002.
-
(2002)
Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002)
, pp. 115-137
-
-
Morin, B.1
Me, L.2
Debar, H.3
Ducassé, M.4
-
15
-
-
0038011185
-
Constructing attack scenarios through correlation of intrusion alerts
-
Washington, D.C., November
-
P. Ning, Y. Cui, and D. S. Reeves. Constructing attack scenarios through correlation of intrusion alerts. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 245-254, Washington, D.C., November 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 245-254
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
18
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
S. Staniford, J. Hoagland, and J. McAlerney. Practical automated detection of stealthy portscans. Journal of Computer Security, 10(1/2):105-136, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.2
McAlerney, J.3
-
24
-
-
84860960189
-
-
Zone Labs. Zonealarm pro. http://www.zonelabs.com.
-
Zonealarm Pro
-
-
|