-
1
-
-
84882755322
-
-
TIAA: A toolkit for intrusion alert analysis
-
TIAA: A toolkit for intrusion alert analysis. http://discovery.csc.ncsu.edu/software/correlator/, 2004.
-
(2004)
-
-
-
4
-
-
0041488497
-
-
CERT Coordinate Center, Accessed in August 2004
-
CERT Coordinate Center. Overview of attack trends. http://www.cert.org/archive/pdf/attack trends.pdf, 2002. Accessed in August 2004.
-
(2002)
Overview of attack trends
-
-
-
11
-
-
84947561772
-
Aggregation and correlation of intrusion-detection alerts
-
LNCS 2212
-
H. Debar and A. Wespi. Aggregation and correlation of intrusion-detection alerts. In Recent Advances in Intrusion Detection, LNCS 2212, pages 85-103, 2001.
-
(2001)
Recent Advances In Intrusion Detection
, pp. 85-103
-
-
Debar, H.1
Wespi, A.2
-
12
-
-
84882807155
-
-
DEFCON. Def con capture the flag (CTF) contest, July
-
DEFCON. Def con capture the flag (CTF) contest. http://www.defcon.org/html/defcon-9/defcon-9-pre.html, July 2001.
-
(2001)
-
-
-
13
-
-
84882775651
-
-
Fyodor. Nmap free security scanner
-
Fyodor. Nmap free security scanner. http://www.insecure.org/nmap, 2003.
-
(2003)
-
-
-
14
-
-
0000351727
-
Investigating causal relations by econometric methods and cross-spectral methods
-
C. Granger. Investigating causal relations by econometric methods and cross-spectral methods. Econometrica, 34:424-428, 1969.
-
(1969)
Econometrica
, vol.34
, pp. 424-428
-
-
Granger, C.1
-
18
-
-
3142623031
-
Clustering intrusion detection alarms to support root cause analysis
-
Nov
-
K. Julisch. Clustering intrusion detection alarms to support root cause analysis. ACM Transactions on Information and System Security, 6(4):443-471, Nov 2003.
-
(2003)
ACM Transactions On Information and System Security
, vol.6
, Issue.4
, pp. 443-471
-
-
Julisch, K.1
-
24
-
-
77956988169
-
M2D2: A formal data model for IDS alert correlation
-
B. Morin, L. Mé, H. Debar, and M. Ducassé. M2D2: A formal data model for IDS alert correlation. In Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), pages 115-137, 2002.
-
(2002)
Proceedings of the 5th International Symposium On Recent Advances In Intrusion Detection (RAID 2002)
, pp. 115-137
-
-
Morin, B.1
Mé, L.2
Debar, H.3
Ducassé, M.4
-
25
-
-
0038011185
-
Constructing attack scenarios through correlation of intrusion alerts
-
Washington, D.C., November
-
P. Ning, Y. Cui, and D.S. Reeves. Constructing attack scenarios through correlation of intrusion alerts. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 245-254, Washington, D.C., November 2002.
-
(2002)
Proceedings of the 9th ACM Conference On Computer and Communications Security
, pp. 245-254
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
26
-
-
3142632087
-
Tools and techniques for analyzing intrusion alerts
-
May
-
P. Ning, Y. Cui, D.S. Reeves, and D. Xu. Tools and techniques for analyzing intrusion alerts. ACM Transactions on Information and System Security, 7(2):273-318, May 2004.
-
(2004)
ACM Transactions On Information and System Security
, vol.7
, Issue.2
, pp. 273-318
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
Xu, D.4
-
27
-
-
14544283296
-
Hypothesizing and reasoning about attacks missed by intrusion detection systems
-
November
-
P. Ning and D. Xu. Hypothesizing and reasoning about attacks missed by intrusion detection systems. ACM Transactions on Information and System Security, 7(4):591-627, November 2004.
-
(2004)
ACM Transactions On Information and System Security
, vol.7
, Issue.4
, pp. 591-627
-
-
Ning, P.1
Xu, D.2
-
32
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
S. Staniford, J.A. Hoagland, and J.M. McAlerney. Practical automated detection of stealthy portscans. Journal of Computer Security, 10(1/2):105-136, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.A.2
McAlerney, J.M.3
-
35
-
-
0002067431
-
NetSTAT: A network-based intrusion detection system
-
G. Vigna and R. A. Kemmerer. NetSTAT: A network-based intrusion detection system. Journal of Computer Security, 7(1):37-71, 1999.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
, pp. 37-71
-
-
Vigna, G.1
Kemmerer, R.A.2
|