메뉴 건너뛰기




Volumn 3995 LNCS, Issue , 2006, Pages 466-480

Requirements of information reductions for cooperating intrusion detection agents

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; DATA TRANSFER; INFORMATION TECHNOLOGY; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 33746646762     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11766155_33     Document Type: Conference Paper
Times cited : (6)

References (32)
  • 2
    • 84944030615 scopus 로고    scopus 로고
    • Pseudonymizing unix log files
    • George Davida, Yair Frankel, and Owen Rees, editors, number 2437 in Lecture Notes in Computer Science, Bristol, United Kingdom, October . Springer
    • Ulrich Flegel. Pseudonymizing Unix log files. In George Davida, Yair Frankel, and Owen Rees, editors, Proceedings of the Infrastructure Security Conference (InfraSec2002), number 2437 in Lecture Notes in Computer Science, pages 162-179, Bristol, United Kingdom, October 2002. Springer.
    • (2002) Proceedings of the Infrastructure Security Conference (InfraSec2002) , pp. 162-179
    • Flegel, U.1
  • 3
    • 0034449375 scopus 로고    scopus 로고
    • Threshold-based identity recovery for privacy enhanced applications
    • Sushil Jajodia and Pierangela Samarati, editors, Athens, Greece, November . ACM SIGSAC, ACM Press
    • Joachim Biskup and Ulrich Flegel. Threshold-based identity recovery for privacy enhanced applications. In Sushil Jajodia and Pierangela Samarati, editors, Proceedings of the 7th ACM Conference on Computer and Communications Security, pages 71 -79, Athens, Greece, November 2000. ACM SIGSAC, ACM Press.
    • (2000) Proceedings of the 7th ACM Conference on Computer and Communications Security , pp. 71-79
    • Biskup, J.1    Flegel, U.2
  • 8
    • 0033293621 scopus 로고    scopus 로고
    • A large scale distributed intrusion detection framework based on attack strategy analysis
    • Ming-Yuh Huang, Robert J. Jasper, and Thomas M. Wicks. A large scale distributed intrusion detection framework based on attack strategy analysis. Computer Networks, 31(23-24):2465-2475, 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2465-2475
    • Huang, M.-Y.1    Jasper, R.J.2    Wicks, T.M.3
  • 9
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion detection systems and multisensor data fusion
    • Tim Bass. Intrusion detection systems and multisensor data fusion. Communications of the ACM, 43(4):99-105, 2000.
    • (2000) Communications of the ACM , vol.43 , Issue.4 , pp. 99-105
    • Bass, T.1
  • 12
    • 84922794799 scopus 로고    scopus 로고
    • Managing alerts in a multi-intrusion detection environment
    • New Orleans, Louisiana, USA, December . IEEE Computer Society Press
    • Frédéric Cuppens. Managing alerts in a multi-intrusion detection environment. In Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), pages 22-31, New Orleans, Louisiana, USA, December 2001. IEEE Computer Society Press.
    • (2001) Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001) , pp. 22-31
    • Cuppens, F.1
  • 13
    • 84958955499 scopus 로고    scopus 로고
    • A mission-impact-based approach to INFOSEC alarm correlation
    • Andreas Wespi, Giovanni Vigna, and Luca Deri, editors, number 2516 in Lecture Notes in Computer Science, Zurich, Switzerland, October . Springer
    • Philip A. Porras, Martin W. Fong, and Alfonso Valdes. A mission-impact-based approach to INFOSEC alarm correlation. In Andreas Wespi, Giovanni Vigna, and Luca Deri, editors, Proceedings of the Fifth International Symposium on Recent Advances in Intrusion Detection (RAID 2002), number 2516 in Lecture Notes in Computer Science, pages 95-114, Zurich, Switzerland, October 2002. Springer.
    • (2002) Proceedings of the Fifth International Symposium on Recent Advances in Intrusion Detection (RAID 2002) , pp. 95-114
    • Porras, P.A.1    Fong, M.W.2    Valdes, A.3
  • 14
    • 21644452488 scopus 로고    scopus 로고
    • Alert correlation through triggering events and common resources
    • Tucson, Arizona, USA, December . IEEE Computer Society Press
    • Dingbang Xu and Peng Ning. Alert correlation through triggering events and common resources. In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), pages 360-369, Tucson, Arizona, USA, December 2004. IEEE Computer Society Press.
    • (2004) Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004) , pp. 360-369
    • Xu, D.1    Ning, P.2
  • 17
    • 33646160004 scopus 로고    scopus 로고
    • Correlation of intrusion symptoms: An application of chronicles
    • Giovanni Vigna, Erland Jonsson, and Christopher Krgel, editors, number 2820 in Lecture Notes in Computer Science, Pittsburgh, Pennsylvania, USA, September . Springer
    • Benjamin Morin and Hervé Debar. Correlation of intrusion symptoms: An application of chronicles. In Giovanni Vigna, Erland Jonsson, and Christopher Krgel, editors, Proceedings of the Sixth International Symposium on Recent Advances in Intrusion Detection (RAID 2003), number 2820 in Lecture Notes in Computer Science, pages 94-112, Pittsburgh, Pennsylvania, USA, September 2003. Springer.
    • (2003) Proceedings of the Sixth International Symposium on Recent Advances in Intrusion Detection (RAID 2003) , pp. 94-112
    • Morin, B.1    Debar, H.2
  • 19
    • 0034593179 scopus 로고    scopus 로고
    • A requires/provides model for computer attacks
    • Cork, Ireland, September . ACM, ACM Press
    • Steven J. Templeton and Karl Levitt. A requires/provides model for computer attacks. In Proceedings of the New Security Paradigms Workshop, pages 31-38, Cork, Ireland, September 2000. ACM, ACM Press.
    • (2000) Proceedings of the New Security Paradigms Workshop , pp. 31-38
    • Templeton, S.J.1    Levitt, K.2
  • 20
    • 0036079912 scopus 로고    scopus 로고
    • Alert correlation in a cooperative intrusion detection framework
    • Berkeley, California, USA, May . IEEE, IEEE Press
    • Frédéric Cuppens and Alexandre Miège. Alert correlation in a cooperative intrusion detection framework. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 202-215, Berkeley, California, USA, May 2002. IEEE, IEEE Press.
    • (2002) Proceedings of the IEEE Symposium on Research in Security and Privacy , pp. 202-215
    • Cuppens, F.1    Miège, A.2
  • 22
    • 10444243686 scopus 로고    scopus 로고
    • Learning attack strategies from intrusion alerts
    • Sushil Jajodia, Vijay Atluri, and Trent Jaeger, editors, Washington, D.C., USA, October . ACM SIGSAC, ACM Press
    • Peng Ning and Dingbang Xu. Learning attack strategies from intrusion alerts. In Sushil Jajodia, Vijay Atluri, and Trent Jaeger, editors, Proceedings of the 10th ACM Conference on Computer and Communications Security, pages 200-209, Washington, D.C., USA, October 2003. ACM SIGSAC, ACM Press.
    • (2003) Proceedings of the 10th ACM Conference on Computer and Communications Security , pp. 200-209
    • Ning, P.1    Xu, D.2
  • 25
    • 33745659908 scopus 로고    scopus 로고
    • Controlled query evaluation for enforcing confidentiality in complete information systems
    • Joachim Biskup and Piero A. Bonatti. Controlled query evaluation for enforcing confidentiality in complete information systems. International Journal of Information Security, 3(1):14-27, 2004.
    • (2004) International Journal of Information Security , vol.3 , Issue.1 , pp. 14-27
    • Biskup, J.1    Bonatti, P.A.2
  • 28
    • 85084159849 scopus 로고    scopus 로고
    • Privacy-preserving sharing and correlation of security alerts
    • San Diego, California, USA, August
    • Patrick Lincoln, Phillip Porras, and Vitaly Shmatikov. Privacy-preserving sharing and correlation of security alerts. In Proceedings of the 13th USENIX Security Symposium, pages 239-254, San Diego, California, USA, August 2004.
    • (2004) Proceedings of the 13th USENIX Security Symposium , pp. 239-254
    • Lincoln, P.1    Porras, P.2    Shmatikov, V.3
  • 29
    • 33746644985 scopus 로고    scopus 로고
    • Privacy-preserving alert correlation: A concept hierarchy based approach
    • Tucson, Arizona, USA, December . IEEE Computer Society Press
    • Dingbang Xu and Peng Ning. Privacy-preserving alert correlation: A concept hierarchy based approach. In Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), pages 537-546, Tucson, Arizona, USA, December 2005. IEEE Computer Society Press.
    • (2005) Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005) , pp. 537-546
    • Xu, D.1    Ning, P.2
  • 30


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.