메뉴 건너뛰기




Volumn , Issue , 2006, Pages

A flexible approach to intrusion alert anonymization and correlation

Author keywords

[No Author keywords available]

Indexed keywords

ALERT CORRELATIONS; ALERT DATA; ALERT SETS; ANONYMIZATION; ATTACK SCENARIOS; ATTRIBUTE VALUES; CONCEPT HIERARCHIES; CORRELATION ANALYSIS; DATA SETS; DATA SHARING; PRIVACY CONCERNS; PRIVACY PROTECTION; RANDOM VALUES; SECURITY RESEARCH; SENSITIVE DATA;

EID: 50049118707     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECCOMW.2006.359544     Document Type: Conference Paper
Times cited : (6)

References (19)
  • 1
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparison study
    • N. Adam and J. Wortmann. Security-control methods for statistical databases: A comparison study. ACM Computing Surveys, 21(4):515-556, 1989.
    • (1989) ACM Computing Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.1    Wortmann, J.2
  • 5
    • 84947561772 scopus 로고    scopus 로고
    • Aggregation and correlation of intrusion-detection alerts
    • Recent Advances in Intrusion Detection
    • H. Debar and A. Wespi. Aggregation and correlation of intrusion-detection alerts. In Recent Advances in Intrusion Detection, LNCS 2212, pages 85-103, 2001.
    • (2001) LNCS , vol.2212 , pp. 85-103
    • Debar, H.1    Wespi, A.2
  • 8
    • 3142623031 scopus 로고    scopus 로고
    • Clustering intrusion detection alarms to support root cause analysis
    • Nov
    • K. Julisch. Clustering intrusion detection alarms to support root cause analysis. ACM Transactions on Information and System Security, 6(4):443-471, Nov 2003.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.4 , pp. 443-471
    • Julisch, K.1
  • 13
    • 14544283296 scopus 로고    scopus 로고
    • Hypothesizing and reasoning about attacks missed by intrusion detection systems
    • November
    • P. Ning and D. Xu. Hypothesizing and reasoning about attacks missed by intrusion detection systems. ACM Transactions on Information and System Security, 7(4):591-627, November 2004.
    • (2004) ACM Transactions on Information and System Security , vol.7 , Issue.4 , pp. 591-627
    • Ning, P.1    Xu, D.2
  • 15
    • 0021389555 scopus 로고
    • Practical data-swapping: The first steps
    • March
    • S. Reiss. Practical data-swapping: The first steps. ACM Transactions on Database Systems, 9(l):20-37, March 1984.
    • (1984) ACM Transactions on Database Systems , vol.9 , Issue.L , pp. 20-37
    • Reiss, S.1
  • 16
    • 0003483188 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
    • Technical Report SRI-CSL-98-04, Computer Science Laboratory, SRI International
    • P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04, Computer Science Laboratory, SRI International, 1998.
    • (1998)
    • Samarati, P.1    Sweeney, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.