-
1
-
-
33646067469
-
-
Axelsson, S., 2000. A preliminary attempt to apply detection and estimation theory to intrusion detection. Technical Report, Department of Computer Engineering, Chalmers University of Technology, Sweden, March.
-
-
-
-
2
-
-
0347742772
-
Intrusion detection systems and multisensor data fusion
-
Bass T. Intrusion detection systems and multisensor data fusion. Communications of the ACM 43 4 (2000) 99-105
-
(2000)
Communications of the ACM
, vol.43
, Issue.4
, pp. 99-105
-
-
Bass, T.1
-
3
-
-
84922794799
-
-
Cuppens, F., 2001. Managing alerts in a multi-intrusion detection environment. Proceedings of the 17th Computer Security Applications Conference, ACSAC 2001, pp. 22-31.
-
-
-
-
5
-
-
33646024653
-
-
Curry, D., Debar, H., Feinstein, B., 2004. The intrusion detection message exchange format 〈http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml-11.txt 〉.
-
-
-
-
6
-
-
26944446508
-
Alarm clustering for intrusion detection systems in computer networks
-
Perner P., and Imiya A. (Eds), Springer, Berlin
-
Giacinto G., Perdisci R., and Roli F. Alarm clustering for intrusion detection systems in computer networks. In: Perner P., and Imiya A. (Eds). Machine Learning and Data Mining in Pattern Recognition, MLDM 2005 (2005), Springer, Berlin 184-193
-
(2005)
Machine Learning and Data Mining in Pattern Recognition, MLDM 2005
, pp. 184-193
-
-
Giacinto, G.1
Perdisci, R.2
Roli, F.3
-
7
-
-
84964509928
-
Information modeling for intrusion report aggregation
-
Goldman R.P., Heimerdinger W., Harp S.A., Geib C.W., Thomas V., and Carter R.L. Information modeling for intrusion report aggregation. Proceedings of the DARPA Information Survivability Conference Exposition II, DISCEX 2001 vol. 1 (2001) 329-342
-
(2001)
Proceedings of the DARPA Information Survivability Conference Exposition II, DISCEX 2001
, vol.1
, pp. 329-342
-
-
Goldman, R.P.1
Heimerdinger, W.2
Harp, S.A.3
Geib, C.W.4
Thomas, V.5
Carter, R.L.6
-
8
-
-
3042821266
-
-
Haines, J., Ryder, D.K., Tinnel, L., Taylor, S., 2003. Validation of sensor alert correlators. IEEE Security Privacy, January-February 2003, pp. 46-56.
-
-
-
-
9
-
-
33646064747
-
-
ISS, Inc. RealSecure intrusion detection system 〈http://www.iss.net 〉.
-
-
-
-
11
-
-
3142623031
-
Clustering intrusion detection alarms to support root cause analysis
-
Julish K. Clustering intrusion detection alarms to support root cause analysis. ACM Transactions on Information and System Security 6 4 (2003) 443-471
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.4
, pp. 443-471
-
-
Julish, K.1
-
12
-
-
33646030933
-
-
Kendall, K., 1999. A database of computer attacks for the evaluation of intrusion detection systems. Master's Thesis, MIT.
-
-
-
-
13
-
-
34848927600
-
-
Kruegel, C., Valeur, F., Vigna, G., 2005. Intrusion detection and correlation. Advances in Information Security Series, vol. 14. Springer, Berlin.
-
-
-
-
14
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
(Special issue on recent advances in intrusion detection systems)
-
Lippmann R., Haines J.W., Fried D.J., Korba J., and Das K. The 1999 DARPA off-line intrusion detection evaluation. Computer Networks 34 4 (2000) 579-595 (Special issue on recent advances in intrusion detection systems)
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
15
-
-
85019691440
-
Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
McHugh J. Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transaction on Information and System Security 3 4 (2000) 262-294
-
(2000)
ACM Transaction on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
16
-
-
84958955499
-
-
Porras, P.A., Fong, M.W., Valdes, A., 2002. A mission-impact-based approach to INFOSEC alarm correlation. In: Wespi, A., Vigna, G., Deri, L. (Eds.), Fifth International Symposium on Recent Advances in Intrusion Detection RAID 2002. Lecture Notes in Computer Science, vol. 2516. Springer, Berlin, pp. 95-114.
-
-
-
-
17
-
-
33646029736
-
-
Prelude Intrusion Detection System 〈http://www.prelude-ids.org 〉.
-
-
-
-
18
-
-
33646057733
-
-
Snort, Lightweight Intrusion Detection for Networks 〈http://www.snort.org 〉.
-
-
-
-
19
-
-
26944492141
-
Signature-based approach for intrusion detection
-
Perner P., and Imiya A. (Eds), Springer, Berlin
-
Sy B. Signature-based approach for intrusion detection. In: Perner P., and Imiya A. (Eds). Machine Learning and Data Mining in Pattern Recognition, MLDM 2005 (2005), Springer, Berlin 526-536
-
(2005)
Machine Learning and Data Mining in Pattern Recognition, MLDM 2005
, pp. 526-536
-
-
Sy, B.1
-
20
-
-
33646046520
-
-
Symantec Network Security 7100 Series 〈http://enterprisesecurity.symantec.com 〉.
-
-
-
-
21
-
-
26944484588
-
-
Undercoffer, J., Joshi, A., Pinkston, J., 2003. Modeling computer attacks: an ontology for intrusion detection. In: Vigna, G., Jonsson, E., Kruegel, C. (Eds.), Sixth International Symposium on Recent Advances in Intrusion Detection, RAID 2003. Lecture Notes in Computer Science, vol. 2820. Springer, Berlin, pp. 113-135.
-
-
-
-
22
-
-
33646066863
-
-
Valdes, A., Skinner, K., 2001. Probabilistic alert correlation. In: Jonsson, E., Valdes, A., Almgren, M. (Eds.), Fourth International Symposium on Recent Advances in Intrusion Detection, RAID 2001. Lecture Notes in Computer Science, vol. 3224. Springer, Berlin, pp. 54-68.
-
-
-
-
23
-
-
21944457574
-
Comprehensive approach to intrusion detection alert correlation
-
Valeur F., Vigna G., Kruegel C., and Kemmerer R.A. Comprehensive approach to intrusion detection alert correlation. IEEE Transactions on Dependable and Secure Computing 1 3 (2004) 146-169
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.3
, pp. 146-169
-
-
Valeur, F.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.A.4
|