메뉴 건너뛰기




Volumn 7, Issue 2, 2004, Pages 274-318

Techniques and tools for analyzing intrusion alerts

Author keywords

Alert correlation; Intrusion detection; Security management

Indexed keywords

ALERT CORRELATION; INTRUSION DETECTION; SECURITY MANAGEMENT;

EID: 3142632087     PISSN: 10949224     EISSN: None     Source Type: Journal    
DOI: 10.1145/996943.996947     Document Type: Review
Times cited : (248)

References (40)
  • 2
    • 0004048154 scopus 로고
    • Computer security threat monitoring and surveillance
    • James P. Anderson Co., Fort Washington, PA
    • ANDERSON, J. P. 1980. Computer security threat monitoring and surveillance. Tech. rep., James P. Anderson Co., Fort Washington, PA.
    • (1980) Tech. Rep.
    • Anderson, J.P.1
  • 4
    • 0003907293 scopus 로고    scopus 로고
    • Macmillan Technology Publishing
    • BACE, R. 2000. Intrusion Detection. Macmillan Technology Publishing.
    • (2000) Intrusion Detection
    • Bace, R.1
  • 9
    • 0004225165 scopus 로고    scopus 로고
    • Intrusion detection message exchange format data model and extensible markup language (XML) document type definition
    • draft-ietf-idwg-idmef-xml-03.txt
    • CURRY, D. AND DEBAR, H. 2001. Intrusion detection message exchange format data model and extensible markup language (XML) document type definition. Internet Draft, draft-ietf-idwg-idmef-xml-03.txt.
    • (2001) Internet Draft
    • Curry, D.1    Debar, H.2
  • 12
    • 35248841190 scopus 로고    scopus 로고
    • Archive accessible at http://wi2600.org/mediawhore/mirrors/shmoo/
    • DEFCON. 2000. DEFCON Capture the Flag (CTF) contest. Available at http://www.defcon.org/html/defcon-8-post.html. Archive accessible at http://wi2600.org/mediawhore/mirrors/shmoo/.
    • (2000) DEFCON Capture the Flag (CTF) Contest
  • 13
    • 0036090387 scopus 로고    scopus 로고
    • STATL: An attack language for state-based intrusion detection
    • ECKMANN, S., VIGNA, G., AND KEMMERER, R. 2002. STATL: An attack language for state-based intrusion detection. J. Comput. Secur. 10, 1/2, 71-104.
    • (2002) J. Comput. Secur. , vol.10 , Issue.1-2 , pp. 71-104
    • Eckmann, S.1    Vigna, G.2    Kemmerer, R.3
  • 16
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • ILGUN, K., KEMMERER, R. A., AND PORRAS, P. A. 1995. State transition analysis: A rule-based intrusion detection approach. IEEE Trans. Softw. Eng. 21, 3, 181-199.
    • (1995) IEEE Trans. Softw. Eng. , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 30
    • 84883386223 scopus 로고    scopus 로고
    • Abstraction-based intrusion detection in distributed environments
    • NING, P., JAJODIA, S., AND WANG, X. S. 2001. Abstraction-based intrusion detection in distributed environments. ACM Trans. Inf. Syst. Secur. 4, 4 (Nov.), 407-452.
    • (2001) ACM Trans. Inf. Syst. Secur. , vol.4 , Issue.4 NOV. , pp. 407-452
    • Ning, P.1    Jajodia, S.2    Wang, X.S.3
  • 35
    • 0036090327 scopus 로고    scopus 로고
    • Practical automated detection of stealthy portscans
    • STANIFORD, S., HOAGLAND, J., AND MCALERNEY, J. 2002. Practical automated detection of stealthy portscans. J. Comput. Secur. 10, 1/2, 105-136.
    • (2002) J. Comput. Secur. , vol.10 , Issue.1-2 , pp. 105-136
    • Staniford, S.1    Hoagland, J.2    McAlerney, J.3
  • 39
    • 0002067431 scopus 로고    scopus 로고
    • NetSTAT: A network-based intrusion detection system
    • VIGNA, G. AND KEMMERER, R. A. 1999. NetSTAT: A network-based intrusion detection system. J. Comput. Secur. 7, 1, 37-71.
    • (1999) J. Comput. Secur. , vol.7 , Issue.1 , pp. 37-71
    • Vigna, G.1    Kemmerer, R.A.2
  • 40
    • 84862374421 scopus 로고    scopus 로고
    • XERCES2 JAVA PARSER
    • XERCES2 JAVA PARSER. Available at http://xml.apache.org/xerces2-j/index. html.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.