메뉴 건너뛰기




Volumn 1, Issue 3, 2004, Pages 146-168

A comprehensive approach to intrusion detection alert correlation

Author keywords

Alert correlation; Alert reduction; Correlation data sets; Intrusion detection

Indexed keywords

ALARM SYSTEMS; CORRELATION METHODS; MATHEMATICAL MODELS; SENSORS; SPECIFICATIONS;

EID: 21944457574     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2004.21     Document Type: Article
Times cited : (379)

References (52)
  • 3
    • 21944454128 scopus 로고
    • Packets found on an internet
    • AT&T Bell Laboratories, May
    • S.M. Bellovin, "Packets Found on an Internet," technical report, AT&T Bell Laboratories, May 1992.
    • (1992) Technical Report
    • Bellovin, S.M.1
  • 5
  • 9
    • 0023294428 scopus 로고
    • An intrusion detection model
    • Feb.
    • D.E. Denning, "An Intrusion Detection Model," IEEE Trans. Software Eng., vol. 13, no. 2, pp. 222-232, Feb. 1987.
    • (1987) IEEE Trans. Software Eng. , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 11
    • 0006064357 scopus 로고    scopus 로고
    • Addendum to testing and evaluating computer intrusion detection systems
    • Sept.
    • R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo, "Addendum to Testing and Evaluating Computer Intrusion Detection Systems," Comm. ACM, vol. 42, no. 9, p. 15, Sept. 1999.
    • (1999) Comm. ACM , vol.42 , Issue.9 , pp. 15
    • Durst, R.1    Champion, T.2    Witten, B.3    Miller, E.4    Spagnuolo, L.5
  • 12
    • 84966620150 scopus 로고    scopus 로고
    • Testing and evaluating computer intrusion detection systems
    • July
    • R. Durst, T. Champion, B. Witten, E. Miller, and L. Spagnuolo, "Testing and Evaluating Computer Intrusion Detection Systems," Comm. ACM, vol. 42, no. 7, pp. 53-61, July 1999.
    • (1999) Comm. ACM , vol.42 , Issue.7 , pp. 53-61
    • Durst, R.1    Champion, T.2    Witten, B.3    Miller, E.4    Spagnuolo, L.5
  • 13
    • 0036090387 scopus 로고    scopus 로고
    • STATL: An attack language for state-based intrusion detection
    • S.T. Eckmann, G. Vigna, and R.A. Kemmerer, "STATL: An Attack Language for State-Based Intrusion Detection," J. Computer Security, vol. 10, nos. 1-2, pp. 71-104, 2002.
    • (2002) J. Computer Security , vol.10 , Issue.1-2 , pp. 71-104
    • Eckmann, S.T.1    Vigna, G.2    Kemmerer, R.A.3
  • 15
    • 21944448273 scopus 로고    scopus 로고
    • Correlating IDS alerts with vulnerability information
    • Tenable Network Security, Dec.
    • R. Gula, "Correlating IDS Alerts with Vulnerability Information," technical report, Tenable Network Security, Dec. 2002.
    • (2002) Technical Report
    • Gula, R.1
  • 19
    • 84860961897 scopus 로고    scopus 로고
    • ISS, Realsecure, http://www.iss.net/, 2004.
    • (2004) Realsecure
  • 20
    • 0004118981 scopus 로고
    • The NIDES statistical component description and justification
    • SRI Int'l, Mar.
    • H.S. Javitz and A. Valdes, "The NIDES Statistical Component Description and Justification," technical report, SRI Int'l, Mar. 1994.
    • (1994) Technical Report
    • Javitz, H.S.1    Valdes, A.2
  • 22
    • 0042958768 scopus 로고
    • The design and implementation of tripwire: A file system integrity checker
    • Purdue Univ., Nov.
    • G.H. Kim and E.H. Spafford, "The Design and Implementation of Tripwire: A File System Integrity Checker", technical report, Purdue Univ., Nov. 1993.
    • (1993) Technical Report
    • Kim, G.H.1    Spafford, E.H.2
  • 23
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in distributed systems: A specification-based approach
    • May
    • C. Ko, M. Ruschitzka, and K. Levitt, "Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach," Proc. 1997 IEEE Symp. Security and Privacy, pp. 175-187, May 1997.
    • (1997) Proc. 1997 IEEE Symp. Security and Privacy , pp. 175-187
    • Ko, C.1    Ruschitzka, M.2    Levitt, K.3
  • 26
    • 21944435071 scopus 로고    scopus 로고
    • MIT Lincoln Laboratory, Lincoln Lab Data Sets, http://www.ll.mit.edu/IST/ ideval/data/data_index.html, 2000.
    • (2000) Lincoln Lab Data Sets
  • 28
    • 84860957164 scopus 로고    scopus 로고
    • Vulnerabilities by Bugtraq ID
    • BugTraq Mailing List, Vulnerabilities by Bugtraq ID, http://www. securityfocus.com/bid/bugtraqid/, 2004.
    • (2004) BugTraq Mailing List
  • 29
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evalautions as performed by Lincoln Laboratory
    • Nov.
    • J. McHugh, "Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evalautions as Performed by Lincoln Laboratory," ACM Trans. Information and System Security, vol. 3, no. 4, Nov. 2000.
    • (2000) ACM Trans. Information and System Security , vol.3 , Issue.4
    • McHugh, J.1
  • 30
    • 21944447859 scopus 로고
    • D.L. Mills network time protocol (Version 3)
    • D.L. Mills Network Time Protocol (Version 3), RFC 1305, 1992.
    • (1992) RFC , vol.1305
  • 36
    • 0038011185 scopus 로고    scopus 로고
    • Constructing attack scenarios through correlation of intrusion alerts
    • Nov.
    • P. Ning, Y. Cui, and D.S. Reeves, "Constructing Attack Scenarios through Correlation of Intrusion Alerts," Proc. ACM Conf. Computer and Comm. Security, pp. 245-254, Nov. 2002.
    • (2002) Proc. ACM Conf. Computer and Comm. Security , pp. 245-254
    • Ning, P.1    Cui, Y.2    Reeves, D.S.3
  • 38
    • 85084164413 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Jan. 1998
    • V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Proc. Seventh USENIX Security Symp., Jan. 1998
    • Proc. Seventh USENIX Security Symp.
    • Paxson, V.1
  • 40
    • 84860962829 scopus 로고    scopus 로고
    • UCSB Reliable Software Group, LinSTAT Webpage, http://www.cs.ucsb.edu/ rsg/STAT/software/linstat.html, 2003.
    • (2003) LinSTAT Webpage
  • 42
    • 0003539116 scopus 로고    scopus 로고
    • Snort - Lightweight intrusion detection for networks
    • Nov.
    • M. Roesch, "Snort - Lightweight Intrusion Detection for Networks," Proc. USENIX LISA '99 Conf., Nov. 1999
    • (1999) Proc. USENIX LISA '99 Conf.
    • Roesch, M.1
  • 46
    • 0009552269 scopus 로고    scopus 로고
    • Adaptive, model-based monitoring for cyber attack detection
    • Oct.
    • A. Valdes and K. Skinner, "Adaptive, Model-Based Monitoring for Cyber Attack Detection," Proc. RAID 2000 Conf., Oct. 2000.
    • (2000) Proc. RAID 2000 Conf.
    • Valdes, A.1    Skinner, K.2
  • 49
    • 20444487371 scopus 로고    scopus 로고
    • Teaching hands-on network security: Testbeds and live exercises
    • G. Vigna, "Teaching Hands-On Network Security: Testbeds and Live Exercises," J. Information Warfare, vol. 3, no. 2, pp. 8-25, 2003.
    • (2003) J. Information Warfare , vol.3 , Issue.2 , pp. 8-25
    • Vigna, G.1
  • 50
    • 0002067431 scopus 로고    scopus 로고
    • NetSTAT: A network-based intrusion detection system
    • G. Vigna and R.A. Kemmerer, "NetSTAT: A Network-Based Intrusion Detection System," J. Computer Security, vol. 7, no. 1, pp. 37-71, 1999.
    • (1999) J. Computer Security , vol.7 , Issue.1 , pp. 37-71
    • Vigna, G.1    Kemmerer, R.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.