-
1
-
-
38049021657
-
A Primitive Attack Based New Correlation Techniques for Heterogeneous Intrusion Alerts- Primitive Attacks Construction and Detection
-
Taipei, Taiwan, November 5-6
-
Chien, S. H., C.Y. Yu, W.T. Liu, and C.S. Ho," A Primitive Attack Based New Correlation Techniques for Heterogeneous Intrusion Alerts- Primitive Attacks Construction and Detection," Proc. of Ninth Conference on Artificial Intelligence and Applications (TAAI2004), Taipei, Taiwan, November 5-6, 2004.
-
(2004)
Proc. of Ninth Conference on Artificial Intelligence and Applications (TAAI2004)
-
-
Chien, S.H.1
Yu, C.Y.2
Liu, W.T.3
Ho, C.S.4
-
2
-
-
0036079912
-
Alert Correlation in a Cooperative Intrusion Detection Framework
-
Oakland, CA
-
Cuppens, F. and A. Miege, "Alert Correlation in a Cooperative Intrusion Detection Framework," Proc. of 2002 IEEE Symposium on Security and Privacy, pp. 202-215, Oakland, CA, 2002.
-
(2002)
Proc. of 2002 IEEE Symposium on Security and Privacy
, pp. 202-215
-
-
Cuppens, F.1
Miege, A.2
-
3
-
-
0038289761
-
Fusing a Heterogeneous Alert Stream into Scenarios
-
Philadelphia, Pennsylvania, USA, Nov. 5-8
-
Dain, O. M. and Cunningham, R. K., "Fusing a Heterogeneous Alert Stream into Scenarios," Proc. of ACM Computer and Communications Security 2001. Philadelphia, Pennsylvania, USA, Nov. 5-8, 2001.
-
(2001)
Proc. of ACM Computer and Communications Security
-
-
Dain, O.M.1
Cunningham, R.K.2
-
4
-
-
0242529344
-
Aggregation and Correlation of Intrusion Detection Alerts
-
Davis, CA, USA, October
-
Debar, H. and A. Wespi, "Aggregation and Correlation of Intrusion Detection Alerts," Proc. of the 4th symposium on Recent Advances in Intrusion Detection (RAID 2001), Davis, CA, USA, October 2001.
-
(2001)
Proc. of the 4th symposium on Recent Advances in Intrusion Detection (RAID
-
-
Debar, H.1
Wespi, A.2
-
5
-
-
84872091580
-
-
available at
-
FuzzyJ ToolKit, available at http://www.iit.nrc.ca/ IR_public/fuzzy/ fuzzyJToolkit2.html
-
FuzzyJ ToolKit
-
-
-
6
-
-
38049046701
-
Attacks against Computer Network: Formal Grammar-based Framework and Simulation Tool
-
Zurish, Switzerland, October 16-18
-
Gorodetski, V. and I. Kotenko, "Attacks against Computer Network: Formal Grammar-based Framework and Simulation Tool," Proc. of the fifth International Workshop on Recent Advances in Intrusion Detection, Zurish, Switzerland, October 16-18, 2002.
-
(2002)
Proc. of the fifth International Workshop on Recent Advances in Intrusion Detection
-
-
Gorodetski, V.1
Kotenko, I.2
-
7
-
-
38049021141
-
-
ICAT database, http://icat.nist.gov/icat.cfm
-
ICAT database
-
-
-
8
-
-
0004204715
-
A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems,
-
Master's Thesis, Massachusetts Institute of Technology
-
Kendall, K., "A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems," Master's Thesis, Massachusetts Institute of Technology, 1998.
-
(1998)
-
-
Kendall, K.1
-
9
-
-
84949211287
-
eXpert-BSM: A Host-based Intrusion Detection Solution for Sun Solaris
-
New Orleans, Louisiana
-
Lindqvist, U. and P. Porras, "eXpert-BSM: A Host-based Intrusion Detection Solution for Sun Solaris," Proc. of 17th Annual Computer Security Applications Conference (ACSAC), pp. 240-251, New Orleans, Louisiana, 2001.
-
(2001)
Proc. of 17th Annual Computer Security Applications Conference (ACSAC)
, pp. 240-251
-
-
Lindqvist, U.1
Porras, P.2
-
10
-
-
0021191078
-
-
Lucassen, J. M. and R. L. Mercer, An Information-Theoretic Approach to the Automatic Determination of Phonemic Baseforms, Proc. of the IEEE International Conference on Acoustics, Speech and Signal, pp. 42.5.1-42.5.4, 1984.
-
Lucassen, J. M. and R. L. Mercer, "An Information-Theoretic Approach to the Automatic Determination of Phonemic Baseforms," Proc. of the IEEE International Conference on Acoustics, Speech and Signal, pp. 42.5.1-42.5.4, 1984.
-
-
-
-
11
-
-
38049073337
-
-
2000 DARPA Intrusion Detection Scenario Specific Data Sets, available at http://www.ll.mit.edu/IST/ ideval/data/ 2000/2000_data_index.html
-
2000 DARPA Intrusion Detection Scenario Specific Data Sets, available at http://www.ll.mit.edu/IST/ ideval/data/ 2000/2000_data_index.html
-
-
-
-
12
-
-
3142632087
-
Tools and Techniques for Analyzing Intrusion Alerts
-
May
-
Ning, P., Y. Cui, D. S. Reeves, and D. Xu, "Tools and Techniques for Analyzing Intrusion Alerts," ACM Transactions on Information and System Security, Vol. 7, No. 2, pp. 214-318, May 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.2
, pp. 214-318
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
Xu, D.4
-
13
-
-
84969506768
-
Applications of hidden Markov models to detecting multi-stage network attacks
-
6-9 Jan
-
Ourston, D., S. Matzner, W. Stump, B. Hopkins, "Applications of hidden Markov models to detecting multi-stage network attacks," Proc. of the 36th Annual Hawaii International Conference on System Sciences, pp. 10, 6-9 Jan 2003.
-
(2003)
Proc. of the 36th Annual Hawaii International Conference on System Sciences
, pp. 10
-
-
Ourston, D.1
Matzner, S.2
Stump, W.3
Hopkins, B.4
-
14
-
-
84863602208
-
-
available at
-
Protégé, available at http://protege.stanford.edu/ download.html
-
Protégé
-
-
-
15
-
-
14544297015
-
Statistical Causality Analysis of INFOSEC Alert Data
-
Pittsburgh, PA, September
-
Qin, X. and W. Lee, "Statistical Causality Analysis of INFOSEC Alert Data," Proc. of the 6th International Symposium on Recent Advances in Intrusion Detection (RAID 2003), Pittsburgh, PA, September 2003.
-
(2003)
Proc. of the 6th International Symposium on Recent Advances in Intrusion Detection (RAID
-
-
Qin, X.1
Lee, W.2
-
16
-
-
84921997237
-
-
available at
-
RealSecure Network Sensor, available at http://www.iss.net/support/ documentation/docs.php?product=12
-
RealSecure Network Sensor
-
-
-
17
-
-
85090433665
-
Snort - lightweight intrusion detection for networks
-
Seattle, Washington, November
-
Roesch, M., "Snort - lightweight intrusion detection for networks," Proc. of LISA'99: 13th Systems Administration Conference, pp. 229-238, Seattle, Washington, November 1999.
-
(1999)
Proc. of LISA'99: 13th Systems Administration Conference
, pp. 229-238
-
-
Roesch, M.1
-
18
-
-
84947603083
-
Probabilistic alert correlation
-
Proc. of the 4th International Symposium on Recent Advances in Intrusion Detection RAID, Springer-Verlag, pp, Davis, CA, USA
-
Valdes, A. and K. Skinner, "Probabilistic alert correlation," Proc. of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001), LNCS (Lecture Notes In Computer Science), Vol. 2212, Springer-Verlag, pp. 54-68, Davis, CA, USA, 2001.
-
(2001)
LNCS (Lecture Notes In Computer Science
, vol.2212
, pp. 54-68
-
-
Valdes, A.1
Skinner, K.2
-
19
-
-
20544433820
-
Extracting attack scenario knowledge using pctcg and semantic networks
-
Orlando, FL, USA
-
Yan, W., E. Hou, N. Ansari, "Extracting attack scenario knowledge using pctcg and semantic networks," Proc. of the 29th Annual IEEE Conference on Local Computer Networks, pp. 110-117, Orlando, FL, USA.
-
Proc. of the 29th Annual IEEE Conference on Local Computer Networks
, pp. 110-117
-
-
Yan, W.1
Hou, E.2
Ansari, N.3
|