-
1
-
-
35048874988
-
Correlation in an intrusion detection process
-
Sept
-
F. Cuppens, F. Autrel, A. Mige, and S. Benferhat, " Correlation in an intrusion detection process," in Proceedings of the Internet Security Communication Workshop (SECI'02) (Tunisia), pp. 153-172, Sept. 2002.
-
(2002)
Proceedings of the Internet Security Communication Workshop (SECI'02) (Tunisia)
, pp. 153-172
-
-
Cuppens, F.1
Autrel, F.2
Mige, A.3
Benferhat, S.4
-
2
-
-
10444226846
-
Recognizing malicious intention in an intrusion detection process
-
Dec
-
F. Cuppens, F. Autrel, A. Miege, and S. Benfer- hat, " Recognizing malicious intention in an intrusion detection process," in Proceedings of Second International Conference on Hybrid Intelligent Systems, pp. 806-817, Dec. 2002.
-
(2002)
Proceedings of Second International Conference on Hybrid Intelligent Systems
, pp. 806-817
-
-
Cuppens, F.1
Autrel, F.2
Miege, A.3
Benfer-Hat, S.4
-
4
-
-
84874791935
-
Practical network attack situation analy- sis using sliding window cache scheme
-
Sept
-
J. Kim, K. Kang, J. Na, I. Kim, K. Kim, J. Jang, and S. Sohn, " Practical network attack situation analy- sis using sliding window cache scheme," in The 9th Asia-Pacific Conference on Communications (APCC 2003), vol. 3, pp. 1038-1041, Sept. 2003.
-
(2003)
The 9th Asia-Pacific Conference on Communications (APCC 2003)
, vol.3
, pp. 1038-1041
-
-
Kim, J.1
Kang, K.2
Na, J.3
Kim, I.4
Kim, K.5
Jang, J.6
Sohn, S.7
-
5
-
-
33847346271
-
An alert fusion framework for situation awareness of coor- dinated multistage attacks
-
S. Mathew, S. Chintan, and S. Upadhyaya, " An alert fusion framework for situation awareness of coor- dinated multistage attacks," in Proceedings of the Third IEEE International Workshop on Information Assurance (IWIA'05), pp. 95-104, 2005.
-
(2005)
Proceedings of the Third IEEE International Workshop on Information Assurance (IWIA'05)
, pp. 95-104
-
-
Mathew, S.1
Chintan, S.2
Upadhyaya, S.3
-
6
-
-
0038011185
-
Construct- ing attack scenarios through correlation of intrusion alerts
-
Nov
-
P. Ning, Y. Cui, and D. S. Reeves, " Construct- ing attack scenarios through correlation of intrusion alerts," in Proceedings of the 9th ACM conference on Computer and communication security (Washington D.C., USA), pp. 245-254, Nov. 2002.
-
(2002)
Proceedings of the 9th ACM conference on Computer and communication security (Washington D.C., USA)
, pp. 245-254
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
7
-
-
3142632087
-
Tech- niques and tools for analyzing intrusion alerts
-
P. Ning, Y. Cui, D. S. Reeves, and D. Xu, " Tech- niques and tools for analyzing intrusion alerts," ACM Transactions on Information and System Security, vol. 7, no. 2, pp. 274-318, 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.2
, pp. 274-318
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
Xu, D.4
-
8
-
-
84947603083
-
Probabilistic alert cor- relation
-
CA, USA, Oct
-
A. Valdes and K. Skinner, " Probabilistic alert cor- relation," in Proceedings of 4th International Sym- posium on Recent Advances in Intrusion Detection (RAID 2001), pp. 54-68, CA, USA, Oct. 2001.
-
(2001)
Proceedings of 4th International Sym- posium on Recent Advances in Intrusion Detection (RAID 2001)
, pp. 54-68
-
-
Valdes, A.1
Skinner, K.2
-
9
-
-
21944457574
-
Comprehensive approach to intrusion detection alert correlation
-
F. Valeur, G. Vigna, C. Kruegel, and R. A. Kem- merer, " Comprehensive approach to intrusion detec- tion alert correlation," IEEE Transactions on De- pendable and Secure Computing, vol. 1, no. 3, pp. 146-169, 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.3
, pp. 146-169
-
-
Valeur, F.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.A.4
|