메뉴 건너뛰기




Volumn 19, Issue 4, 2006, Pages 429-438

Alarm clustering for intrusion detection systems in computer networks

Author keywords

Alarm clustering; Computer security; Intrusion detection

Indexed keywords

ALARM SYSTEMS; COMPUTER CRIME; COMPUTER NETWORKS; CYBERNETICS; INFORMATION USE; SENSORS;

EID: 33646037321     PISSN: 09521976     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.engappai.2006.01.003     Document Type: Article
Times cited : (86)

References (23)
  • 1
    • 33646067469 scopus 로고    scopus 로고
    • Axelsson, S., 2000. A preliminary attempt to apply detection and estimation theory to intrusion detection. Technical Report, Department of Computer Engineering, Chalmers University of Technology, Sweden, March.
  • 2
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion detection systems and multisensor data fusion
    • Bass T. Intrusion detection systems and multisensor data fusion. Communications of the ACM 43 4 (2000) 99-105
    • (2000) Communications of the ACM , vol.43 , Issue.4 , pp. 99-105
    • Bass, T.1
  • 3
    • 84922794799 scopus 로고    scopus 로고
    • Cuppens, F., 2001. Managing alerts in a multi-intrusion detection environment. Proceedings of the 17th Computer Security Applications Conference, ACSAC 2001, pp. 22-31.
  • 5
    • 33646024653 scopus 로고    scopus 로고
    • Curry, D., Debar, H., Feinstein, B., 2004. The intrusion detection message exchange format 〈http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml-11.txt 〉.
  • 6
    • 26944446508 scopus 로고    scopus 로고
    • Alarm clustering for intrusion detection systems in computer networks
    • Perner P., and Imiya A. (Eds), Springer, Berlin
    • Giacinto G., Perdisci R., and Roli F. Alarm clustering for intrusion detection systems in computer networks. In: Perner P., and Imiya A. (Eds). Machine Learning and Data Mining in Pattern Recognition, MLDM 2005 (2005), Springer, Berlin 184-193
    • (2005) Machine Learning and Data Mining in Pattern Recognition, MLDM 2005 , pp. 184-193
    • Giacinto, G.1    Perdisci, R.2    Roli, F.3
  • 8
    • 3042821266 scopus 로고    scopus 로고
    • Haines, J., Ryder, D.K., Tinnel, L., Taylor, S., 2003. Validation of sensor alert correlators. IEEE Security Privacy, January-February 2003, pp. 46-56.
  • 9
    • 33646064747 scopus 로고    scopus 로고
    • ISS, Inc. RealSecure intrusion detection system 〈http://www.iss.net 〉.
  • 11
    • 3142623031 scopus 로고    scopus 로고
    • Clustering intrusion detection alarms to support root cause analysis
    • Julish K. Clustering intrusion detection alarms to support root cause analysis. ACM Transactions on Information and System Security 6 4 (2003) 443-471
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.4 , pp. 443-471
    • Julish, K.1
  • 12
    • 33646030933 scopus 로고    scopus 로고
    • Kendall, K., 1999. A database of computer attacks for the evaluation of intrusion detection systems. Master's Thesis, MIT.
  • 13
    • 34848927600 scopus 로고    scopus 로고
    • Kruegel, C., Valeur, F., Vigna, G., 2005. Intrusion detection and correlation. Advances in Information Security Series, vol. 14. Springer, Berlin.
  • 14
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 DARPA off-line intrusion detection evaluation
    • (Special issue on recent advances in intrusion detection systems)
    • Lippmann R., Haines J.W., Fried D.J., Korba J., and Das K. The 1999 DARPA off-line intrusion detection evaluation. Computer Networks 34 4 (2000) 579-595 (Special issue on recent advances in intrusion detection systems)
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 579-595
    • Lippmann, R.1    Haines, J.W.2    Fried, D.J.3    Korba, J.4    Das, K.5
  • 15
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
    • McHugh J. Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transaction on Information and System Security 3 4 (2000) 262-294
    • (2000) ACM Transaction on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 16
    • 84958955499 scopus 로고    scopus 로고
    • Porras, P.A., Fong, M.W., Valdes, A., 2002. A mission-impact-based approach to INFOSEC alarm correlation. In: Wespi, A., Vigna, G., Deri, L. (Eds.), Fifth International Symposium on Recent Advances in Intrusion Detection RAID 2002. Lecture Notes in Computer Science, vol. 2516. Springer, Berlin, pp. 95-114.
  • 17
    • 33646029736 scopus 로고    scopus 로고
    • Prelude Intrusion Detection System 〈http://www.prelude-ids.org 〉.
  • 18
    • 33646057733 scopus 로고    scopus 로고
    • Snort, Lightweight Intrusion Detection for Networks 〈http://www.snort.org 〉.
  • 19
    • 26944492141 scopus 로고    scopus 로고
    • Signature-based approach for intrusion detection
    • Perner P., and Imiya A. (Eds), Springer, Berlin
    • Sy B. Signature-based approach for intrusion detection. In: Perner P., and Imiya A. (Eds). Machine Learning and Data Mining in Pattern Recognition, MLDM 2005 (2005), Springer, Berlin 526-536
    • (2005) Machine Learning and Data Mining in Pattern Recognition, MLDM 2005 , pp. 526-536
    • Sy, B.1
  • 20
    • 33646046520 scopus 로고    scopus 로고
    • Symantec Network Security 7100 Series 〈http://enterprisesecurity.symantec.com 〉.
  • 21
    • 26944484588 scopus 로고    scopus 로고
    • Undercoffer, J., Joshi, A., Pinkston, J., 2003. Modeling computer attacks: an ontology for intrusion detection. In: Vigna, G., Jonsson, E., Kruegel, C. (Eds.), Sixth International Symposium on Recent Advances in Intrusion Detection, RAID 2003. Lecture Notes in Computer Science, vol. 2820. Springer, Berlin, pp. 113-135.
  • 22
    • 33646066863 scopus 로고    scopus 로고
    • Valdes, A., Skinner, K., 2001. Probabilistic alert correlation. In: Jonsson, E., Valdes, A., Almgren, M. (Eds.), Fourth International Symposium on Recent Advances in Intrusion Detection, RAID 2001. Lecture Notes in Computer Science, vol. 3224. Springer, Berlin, pp. 54-68.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.