메뉴 건너뛰기




Volumn 38, Issue , 2008, Pages 65-92

Correlation analysis of intrusion alerts

Author keywords

[No Author keywords available]

Indexed keywords


EID: 78049324449     PISSN: 15682633     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-77265-3_4     Document Type: Article
Times cited : (28)

References (39)
  • 1
    • 84882755322 scopus 로고    scopus 로고
    • TIAA: A toolkit for intrusion alert analysis
    • TIAA: A toolkit for intrusion alert analysis. http://discovery.csc.ncsu.edu/software/correlator/, 2004.
    • (2004)
  • 4
    • 0041488497 scopus 로고    scopus 로고
    • CERT Coordinate Center, Accessed in August 2004
    • CERT Coordinate Center. Overview of attack trends. http://www.cert.org/archive/pdf/attack trends.pdf, 2002. Accessed in August 2004.
    • (2002) Overview of attack trends
  • 11
    • 84947561772 scopus 로고    scopus 로고
    • Aggregation and correlation of intrusion-detection alerts
    • LNCS 2212
    • H. Debar and A. Wespi. Aggregation and correlation of intrusion-detection alerts. In Recent Advances in Intrusion Detection, LNCS 2212, pages 85-103, 2001.
    • (2001) Recent Advances In Intrusion Detection , pp. 85-103
    • Debar, H.1    Wespi, A.2
  • 12
    • 84882807155 scopus 로고    scopus 로고
    • DEFCON. Def con capture the flag (CTF) contest, July
    • DEFCON. Def con capture the flag (CTF) contest. http://www.defcon.org/html/defcon-9/defcon-9-pre.html, July 2001.
    • (2001)
  • 13
    • 84882775651 scopus 로고    scopus 로고
    • Fyodor. Nmap free security scanner
    • Fyodor. Nmap free security scanner. http://www.insecure.org/nmap, 2003.
    • (2003)
  • 14
    • 0000351727 scopus 로고
    • Investigating causal relations by econometric methods and cross-spectral methods
    • C. Granger. Investigating causal relations by econometric methods and cross-spectral methods. Econometrica, 34:424-428, 1969.
    • (1969) Econometrica , vol.34 , pp. 424-428
    • Granger, C.1
  • 18
    • 3142623031 scopus 로고    scopus 로고
    • Clustering intrusion detection alarms to support root cause analysis
    • Nov
    • K. Julisch. Clustering intrusion detection alarms to support root cause analysis. ACM Transactions on Information and System Security, 6(4):443-471, Nov 2003.
    • (2003) ACM Transactions On Information and System Security , vol.6 , Issue.4 , pp. 443-471
    • Julisch, K.1
  • 27
    • 14544283296 scopus 로고    scopus 로고
    • Hypothesizing and reasoning about attacks missed by intrusion detection systems
    • November
    • P. Ning and D. Xu. Hypothesizing and reasoning about attacks missed by intrusion detection systems. ACM Transactions on Information and System Security, 7(4):591-627, November 2004.
    • (2004) ACM Transactions On Information and System Security , vol.7 , Issue.4 , pp. 591-627
    • Ning, P.1    Xu, D.2
  • 35
    • 0002067431 scopus 로고    scopus 로고
    • NetSTAT: A network-based intrusion detection system
    • G. Vigna and R. A. Kemmerer. NetSTAT: A network-based intrusion detection system. Journal of Computer Security, 7(1):37-71, 1999.
    • (1999) Journal of Computer Security , vol.7 , Issue.1 , pp. 37-71
    • Vigna, G.1    Kemmerer, R.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.