-
1
-
-
85133875019
-
Alert correlation survey: Framework and techniques
-
ACM Press, Markham, Ontario, Canada
-
R. Sadoddin, A. Ghorbani: Alert Correlation Survey: Framework and Techniques, In: Proceedings of the International Conference on Privacy, Security and Trust (PST'06), ACM Press, Markham, Ontario, Canada, pp. 1-10 (2006).
-
(2006)
Proceedings of the International Conference on Privacy, Security and Trust (PST'06)
, pp. 1-10
-
-
Sadoddin, R.1
Ghorbani, A.2
-
2
-
-
0004225165
-
-
Technical Report, IETF Intrusion Detection Exchange Format Working Group July
-
Debar, H., Curry, D., Feinstein, B.: The Intrusion Detection Message Exchange Format, Internet Draft, Technical Report, IETF Intrusion Detection Exchange Format Working Group (July 2004).
-
(2004)
The Intrusion Detection Message Exchange Format, Internet Draft
-
-
Debar, H.1
Curry, D.2
Feinstein, B.3
-
3
-
-
0013347631
-
-
CVE Website, (Accessed March 2009)
-
Mitre Corporation: Common vulnerabilities and exposures, CVE Website: http://cve.mitre.org/, (Accessed March 2009).
-
Common Vulnerabilities and Exposures
-
-
-
4
-
-
3142623031
-
Clustering intrusion detection alarms to support root cause analysis
-
K. Julisch: Clustering intrusion detection alarms to support root cause analysis, In: ACM Transactions on Information and System Security, vol. 6, Issue 4, pp. 443-471 (2003).
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.4
, pp. 443-471
-
-
Julisch, K.1
-
5
-
-
84922794799
-
Managing alerts in a multi-intrusion detection environment
-
IEEE Press, New-Orleans, USA, December
-
F. Cuppens: Managing alerts in a multi-intrusion detection environment, In: Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC'01), IEEE Press, New-Orleans, USA, pp. 0022 (December 2001).
-
(2001)
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC'01)
, pp. 0022
-
-
Cuppens, F.1
-
6
-
-
84947603083
-
Probabilistic alert correlation
-
Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID'00), London, UK, Springer
-
A. Valdes and K. Skinner: Probabilistic alert correlation, In: Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID'00), London, UK, Springer LNCS 2212, pp.54-68 (2001).
-
(2001)
LNCS
, vol.2212
, pp. 54-68
-
-
Valdes, A.1
Skinner, K.2
-
7
-
-
84947561772
-
Aggregation and correlation of intrusiondetection alerts
-
Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID'01), London, UK, Springer
-
H. Debar and A. Wespi: Aggregation and correlation of intrusiondetection alerts, In: Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID'01), London, UK, Springer LNCS 2212, pp. 85-103 (2001).
-
(2001)
LNCS
, vol.2212
, pp. 85-103
-
-
Debar, H.1
Wespi, A.2
-
8
-
-
0038011185
-
Constructing attack scenarios through correlation of intrusion alerts
-
ACM Press, Washington, DC, USA
-
P. Ning, Y. Cui, and D. Reeves: Constructing attack scenarios through correlation of intrusion alerts, In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02) ACM Press, Washington, DC, USA, pp. 245-254 (2002).
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02)
, pp. 245-254
-
-
Ning, P.1
Cui, Y.2
Reeves, D.3
-
10
-
-
33646844014
-
Statistical causality analysis of infosec alert data
-
Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection (RAID'03), London, UK, Springer
-
W. L. Xinzhou Qin: Statistical causality analysis of infosec alert data, In: Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection (RAID'03), London, UK, Springer LNCS 2820, pp. 73-93 (2003).
-
(2003)
LNCS
, vol.2820
, pp. 73-93
-
-
Xinzhou Qin, W.L.1
-
11
-
-
0034301662
-
A data mining analysis of rtid alarms
-
S. Manganaris, M. Christensen, D. Zerkle, and K. Hermiz: A data mining analysis of rtid alarms, In: Computer Networks, vol. 34, Issue 4, pp. 571-577 (2000).
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 571-577
-
-
Manganaris, S.1
Christensen, M.2
Zerkle, D.3
Hermiz, K.4
-
12
-
-
24944462424
-
A cognitive model for alert correlation in a distributed environment
-
IEEE Press, Atlanta, GA, USA
-
A. Siraj and R. B. Vaughn: A cognitive model for alert correlation in a distributed environment, In: Proceedings of IEEE International Conference on Intelligence and Security Informatics (ISI'05), IEEE Press, Atlanta, GA, USA, pp. 218-230 (2005).
-
(2005)
Proceedings of IEEE International Conference on Intelligence and Security Informatics (ISI'05)
, pp. 218-230
-
-
Siraj, A.1
Vaughn, R.B.2
-
13
-
-
79958186026
-
Building attack scenarios through integration of complementary alert correlation method
-
The Internet Society, San Diego, California, USA
-
P. Ning, D. Xu, C. G. Healey, and R. S. Amant: Building attack scenarios through integration of complementary alert correlation method, In: Proceedings of the Network and Distributed System Security Symposium (NDSS'04), The Internet Society, San Diego, California, USA, 2004.
-
(2004)
Proceedings of the Network and Distributed System Security Symposium (NDSS'04)
-
-
Ning, P.1
Xu, D.2
Healey, C.G.3
Amant, R.S.4
-
14
-
-
84958955499
-
A mission-impact-based approach to infosec alarm correlation
-
Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID'02), London, UK, Springer
-
P. A. Porras, M. W. Fong, and A. Valdes: A mission-impact-based approach to infosec alarm correlation, In: Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID'02), London, UK, Springer LNCS, pp. 95-114 (2002).
-
(2002)
LNCS
, pp. 95-114
-
-
Porras, P.A.1
Fong, M.W.2
Valdes, A.3
-
15
-
-
73049108376
-
A common database approach for OLTP and OLAP using an in-memory column database
-
ACM Press, Providence, Rhode Island, USA
-
H. Plattner: A Common Database Approach for OLTP and OLAP Using an In-Memory Column Database, In: Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD'09), ACM Press, Providence, Rhode Island, USA, pp. 1-2 (2009).
-
(2009)
Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD'09)
, pp. 1-2
-
-
Plattner, H.1
-
16
-
-
34250655820
-
Integrating compression and execution in column-oriented database systems
-
ACM Press, Chicago, Illinois, USA
-
D. J. Abadi, S. Madden, and M. Ferreira: Integrating Compression and Execution in Column-Oriented Database Systems, In: Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD'06), ACM Press, Chicago, Illinois, USA, pp. 671-682 (2006).
-
(2006)
Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD'06)
, pp. 671-682
-
-
Abadi, D.J.1
Madden, S.2
Ferreira, M.3
-
17
-
-
0003075199
-
Database architecture optimized for the new bottleneck: Memory access
-
Edinburgh, Scotland, UK
-
P. A. Boncz, S. Manegold, and M. L. Kersten: Database Architecture Optimized for the New Bottleneck: Memory Access, In: Proceedings of 25th International Conference on Very Large Data Bases (VLDB'99), Edinburgh, Scotland, UK, pp. 54-65 (1999).
-
(1999)
Proceedings of 25th International Conference on Very Large Data Bases (VLDB'99)
, pp. 54-65
-
-
Boncz, P.A.1
Manegold, S.2
Kersten, M.L.3
-
18
-
-
78650381677
-
-
WEBSITE, (accessed Nov 2009)
-
MonetDB: WEBSITE: http://monetdb.cwi.nl/ (accessed Nov 2009).
-
-
-
-
20
-
-
78650400609
-
-
WEBSITE, (accessed Nov 2009)
-
MySQL: WEBSITE: http://www.mysql.com/ (accessed Nov 2009).
-
-
-
-
21
-
-
78650410882
-
-
WEBSITE, (accessed Nov 2009)
-
PostgreSQL: WEBSITE: http://www.postgresql.org/ (accessed Nov 2009).
-
-
-
-
22
-
-
78650405265
-
-
WEBSITE, (accessed Nov 2009)
-
Snort IDS: WEBSITE: http://www.snort.org/ (accessed Nov 2009).
-
-
-
-
23
-
-
74049138988
-
An extensible and virtualization- compatible IDS management architecture
-
IEEE Press, Xi'an, China, August
-
Roschke, S., Cheng, F., Meinel, Ch.: An Extensible and Virtualization- Compatible IDS Management Architecture, In: Proceedings of 5th International Conference on Information Assurance and Security (IAS'09), IEEE Press, vol. 2, Xi'an, China, pp. 130-134 (August 2009).
-
(2009)
Proceedings of 5th International Conference on Information Assurance and Security (IAS'09)
, vol.2
, pp. 130-134
-
-
Roschke, S.1
Cheng, F.2
Meinel, Ch.3
-
25
-
-
58449084939
-
Real-time alert correlation with type graphs
-
Proceedings of the 4th international Conference on Information Systems Security (ISS'09), Springer, Hyderabad, India
-
Tedesco, G. and Aickelin, U.: Real-Time Alert Correlation with Type Graphs, In: Proceedings of the 4th international Conference on Information Systems Security (ISS'09), Springer LNCS 5352, Hyderabad, India, pp. 173-187 (2008).
-
(2008)
LNCS
, vol.5352
, pp. 173-187
-
-
Tedesco, G.1
Aickelin, U.2
-
27
-
-
0004145060
-
-
Thousand Oaks, CA, USA
-
Northcutt, S., Novak, J.: Network Intrusion Detection: An Analyst's Handbook, New Riders Publishing, Thousand Oaks, CA, USA (2002).
-
(2002)
Network Intrusion Detection: An Analyst's Handbook, New Riders Publishing
-
-
Northcutt, S.1
Novak, J.2
|