메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 537-546

Privacy-preserving alert correlation: A concept hierarchy based approach

Author keywords

[No Author keywords available]

Indexed keywords

BUILDING ATTACKS; INTRUSION ANALYSIS; PRIVACY PRESERVING ALERT CORRELATION; SANITIZATION PROCESSES;

EID: 33746644985     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2005.45     Document Type: Conference Paper
Times cited : (36)

References (20)
  • 1
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparison study
    • N. Adam and J. Wortmann. Security-control methods for statistical databases: A comparison study. ACM Computing Surveys, 21 (4):515-556, 1989.
    • (1989) ACM Computing Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.1    Wortmann, J.2
  • 5
    • 84947561772 scopus 로고    scopus 로고
    • Aggregation and correlation of intrusion-detection alerts
    • Recent Advances in Intrusion Detection
    • H. Debar and A. Wespi. Aggregation and correlation of intrusion-detection alerts. In Recent Advances in Intrusion Detection, LNCS 2212, pages 85-103, 2001.
    • (2001) LNCS , vol.2212 , pp. 85-103
    • Debar, H.1    Wespi, A.2
  • 6
    • 0022130080 scopus 로고
    • A data distortion by probability distribution
    • September
    • C. Liew, U. Choi, and C. Liew. A data distortion by probability distribution. ACM Transactions on Database Systems, 10(3):395-411, September 1985.
    • (1985) ACM Transactions on Database Systems , vol.10 , Issue.3 , pp. 395-411
    • Liew, C.1    Choi, U.2    Liew, C.3
  • 9
    • 33846297858 scopus 로고    scopus 로고
    • B. Morin and H. Debar. Correlation of intrusion symptoms: an application of chronicles. In Proceedings of the 6th International Conference on Recent Advances in Intrusion Detection (RAID'03), September 2003.
    • B. Morin and H. Debar. Correlation of intrusion symptoms: an application of chronicles. In Proceedings of the 6th International Conference on Recent Advances in Intrusion Detection (RAID'03), September 2003.
  • 12
    • 14544283296 scopus 로고    scopus 로고
    • Hypothesizing and reasoning about attacks missed by intrusion detection systems
    • November
    • P. Ning and D. Xu. Hypothesizing and reasoning about attacks missed by intrusion detection systems. ACM Transactions on Information and System Security, 7(4):591-627, November 2004.
    • (2004) ACM Transactions on Information and System Security , vol.7 , Issue.4 , pp. 591-627
    • Ning, P.1    Xu, D.2
  • 14
    • 0021389555 scopus 로고
    • Practical data-swapping: The first steps
    • March
    • S. Reiss. Practical data-swapping: The first steps. ACM Transactions on Database Systems, 9(1):20-37, March 1984.
    • (1984) ACM Transactions on Database Systems , vol.9 , Issue.1 , pp. 20-37
    • Reiss, S.1
  • 15
    • 0003483188 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
    • Technical Report SRI-CSL-98-04, Computer Science Laboratory, SRI International
    • P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04, Computer Science Laboratory, SRI International, 1998.
    • (1998)
    • Samarati, P.1    Sweeney, L.2
  • 16
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • July
    • C. Shannon. A mathematical theory of communication. The Bell System Technical Journal, 21:319-423, 623-656, July 1948.
    • (1948) The Bell System Technical Journal , vol.21
    • Shannon, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.