-
1
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy
-
Dept. of Computer Eng., Chalmers Univ. of Technology
-
S. Axelsson, "Intrusion Detection Systems: A Survey and Taxonomy," Technical Report 99-15, Dept. of Computer Eng., Chalmers Univ. of Technology, 2000.
-
(2000)
Technical Report 99-15
-
-
Axelsson, S.1
-
2
-
-
0001907993
-
Theoretical underpinnings of situation awareness: A critical review
-
M.R. Endsley and D.J. Garland, eds., chapter 1, Lawrence Erlbaum Assoc.
-
M.R. Endsley, "Theoretical Underpinnings of Situation Awareness: A Critical Review," Situation Awareness Analysis and Measurement, M.R. Endsley and D.J. Garland, eds., chapter 1, pp. 3-32, Lawrence Erlbaum Assoc., 2000.
-
(2000)
Situation Awareness Analysis and Measurement
, pp. 3-32
-
-
Endsley, M.R.1
-
5
-
-
48049099857
-
Intrusion detection systems: Perspective
-
Gartner, Inc.
-
A. Allen, "Intrusion Detection Systems: Perspective," Technical Report DPRO-95367, Gartner, Inc., 2003.
-
(2003)
Technical Report DPRO-95367
-
-
Allen, A.1
-
6
-
-
21944457574
-
A comprehensive approach to intrusion detection alert correlation
-
July-Sept.
-
F. Valeur, G. Vigna, C. Krügel, and R.A. Kemmerer, "A Comprehensive Approach to Intrusion Detection Alert Correlation," IEEE Trans. Dependable and Secure Computing, vol. 1, no. 3, pp. 146-169, July-Sept. 2004.
-
(2004)
IEEE Trans. Dependable and Secure Computing
, vol.1
, Issue.3
, pp. 146-169
-
-
Valeur, F.1
Vigna, G.2
Krügel, C.3
Kemmerer, R.A.4
-
7
-
-
0242529344
-
Aggregation and correlation of intrusion-detection alerts
-
W. Lee L. Me, and A. Wespi, eds., Springer
-
H. Debar and A. Wespi, "Aggregation and Correlation of Intrusion-Detection Alerts," Recent Advances in Intrusion Detection, W. Lee, L. Me, and A. Wespi, eds., pp. 85-103, Springer, 2001.
-
(2001)
Recent Advances in Intrusion Detection
, pp. 85-103
-
-
Debar, H.1
Wespi, A.2
-
8
-
-
54049101643
-
Processing intrusion detection alerts in large-scale network
-
D. Li, Z. Li, and J. Ma, "Processing Intrusion Detection Alerts in Large-Scale Network," Proc. Int'l Symp. Electronic Commerce and Security, pp. 545-548, 2008.
-
(2008)
Proc. Int'l Symp. Electronic Commerce and Security
, pp. 545-548
-
-
Li, D.1
Li, Z.2
Ma, J.3
-
10
-
-
0037952266
-
Probabilistic alert correlation
-
W. Lee L. Me, and A. Wespi, eds., Springer
-
A. Valdes and K. Skinner, "Probabilistic Alert Correlation," Recent Advances in Intrusion Detection, W. Lee, L. Me, and A. Wespi, eds. pp. 54-68, Springer, 2001.
-
(2001)
Recent Advances in Intrusion Detection
, pp. 54-68
-
-
Valdes, A.1
Skinner, K.2
-
13
-
-
78751656783
-
Using an intrusion detection alert similarity operator to aggregate and fuse alerts
-
F. Autrel and F. Cuppens, "Using an Intrusion Detection Alert Similarity Operator to Aggregate and Fuse Alerts," Proc. Fourth Conf. Security and Network Architectures, pp. 312-322, 2005.
-
(2005)
Proc. Fourth Conf. Security and Network Architectures
, pp. 312-322
-
-
Autrel, F.1
Cuppens, F.2
-
14
-
-
26944446508
-
Alarm clustering for intrusion detection systems in computer networks
-
P. Perner and A. Imiya, eds. Springer
-
G. Giacinto, R. Perdisci, and F. Roli, "Alarm Clustering for Intrusion Detection Systems in Computer Networks," Machine Learning and Data Mining in Pattern Recognition, P. Perner and A. Imiya, eds. pp. 184-193, Springer, 2005.
-
(2005)
Machine Learning and Data Mining in Pattern Recognition
, pp. 184-193
-
-
Giacinto, G.1
Perdisci, R.2
Roli, F.3
-
16
-
-
3142632087
-
Techniques and tools for analyzing intrusion alerts
-
P. Ning, Y. Cui, D.S. Reeves, and D. Xu, "Techniques and Tools for Analyzing Intrusion Alerts," ACM Trans. Information Systems Security, vol. 7, no. 2, pp. 274-318, 2004.
-
(2004)
ACM Trans. Information Systems Security
, vol.7
, Issue.2
, pp. 274-318
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
Xu, D.4
-
17
-
-
84944201343
-
LAMBDA: A language to model a database for detection of attacks
-
H. Debar L. Me, and S.F. Wu, eds. Springer
-
F. Cuppens and R. Ortalo, "LAMBDA: A Language to Model a Database for Detection of Attacks," Recent Advances in Intrusion Detection, H. Debar, L. Me, and S.F. Wu, eds. pp. 197-216, Springer, 2000.
-
(2000)
Recent Advances in Intrusion Detection
, pp. 197-216
-
-
Cuppens, F.1
Ortalo, R.2
-
18
-
-
0036090387
-
STATL: An attack language for state-based intrusion detection
-
S.T. Eckmann, G. Vigna, and R.A. Kemmerer, "STATL: An Attack Language for State-Based Intrusion Detection," J. Computer Security, vol. 10, nos. 1/2, pp. 71-103, 2002.
-
(2002)
J. Computer Security
, vol.10
, Issue.1-2
, pp. 71-103
-
-
Eckmann, S.T.1
Vigna, G.2
Kemmerer, R.A.3
-
20
-
-
21144437229
-
Applying data mining techniques to analyze alert data
-
X. Zhou, Y. Zhang, and M.E. Orlowska, eds. Springer
-
M.S. Shin, H. Moon, K.H. Ryu, K. Kim, and J. Kim, "Applying Data Mining Techniques to Analyze Alert Data," Web Technologies and Applications, X. Zhou, Y. Zhang, and M.E. Orlowska, eds. pp. 193-200, Springer, 2003.
-
(2003)
Web Technologies and Applications
, pp. 193-200
-
-
Shin, M.S.1
Moon, H.2
Ryu, K.H.3
Kim, K.4
Kim, J.5
-
21
-
-
38349014401
-
A comprehensive approach to detect unknown attacks via intrusion detection alerts
-
I. Cervesato, ed. Springer
-
J. Song, H. Ohba, H. Takakura, Y. Okabe, K. Ohira, and Y. Kwon, "A Comprehensive Approach to Detect Unknown Attacks via Intrusion Detection Alerts," Advances in Computer Science-ASIAN 2007, Computer and Network Security, I. Cervesato, ed., pp. 247-253, Springer, 2008.
-
(2008)
Advances in Computer Science-ASIAN 2007, Computer and Network Security
, pp. 247-253
-
-
Song, J.1
Ohba, H.2
Takakura, H.3
Okabe, Y.4
Ohira, K.5
Kwon, Y.6
-
22
-
-
44649096422
-
Using unsupervised learning for network alert correlation
-
R. Goebel, J. Siekmann, and W. Wahlster, eds. Springer
-
R. Smith, N. Japkowicz, M. Dondo, and P. Mason, "Using Unsupervised Learning for Network Alert Correlation," Advances in Artificial Intelligence, R. Goebel, J. Siekmann, and W. Wahlster, eds. pp. 308-319, Springer, 2008.
-
(2008)
Advances in Artificial Intelligence
, pp. 308-319
-
-
Smith, R.1
Japkowicz, N.2
Dondo, M.3
Mason, P.4
-
23
-
-
78751665735
-
Identifying attack instances by alert clustering
-
A. Hofmann, D. Fisch, and B. Sick, "Identifying Attack Instances by Alert Clustering," Proc. IEEE Three-Rivers Workshop Soft Computing in Industrial Applications (SMCia '07), pp. 25-31, 2007.
-
(2007)
Proc. IEEE Three-Rivers Workshop Soft Computing in Industrial Applications (SMCia '07)
, pp. 25-31
-
-
Hofmann, A.1
Fisch, D.2
Sick, B.3
-
25
-
-
37249060196
-
A distributed intrusion detection architecture with organic behavior
-
O. Buchtala, W. Grass, A. Hofmann, and B. Sick, "A Distributed Intrusion Detection Architecture with Organic Behavior," Proc. First CRIS Int'l Workshop Critical Information Infrastructures (CIIW '05), pp. 47-56, 2005.
-
(2005)
Proc. First CRIS Int'l Workshop Critical Information Infrastructures (CIIW '05)
, pp. 47-56
-
-
Buchtala, O.1
Grass, W.2
Hofmann, A.3
Sick, B.4
-
26
-
-
70349294193
-
A framework for large-scale simulation of collaborative intrusion detection
-
D. Fisch, A. Hofmann, V. Hornik, I. Dedinski, and B. Sick, "A Framework for Large-Scale Simulation of Collaborative Intrusion Detection," Proc. IEEE Conf. Soft Computing in Industrial Applications (SMCia '08), pp. 125-130, 2008.
-
(2008)
Proc. IEEE Conf. Soft Computing in Industrial Applications (SMCia '08)
, pp. 125-130
-
-
Fisch, D.1
Hofmann, A.2
Hornik, V.3
Dedinski, I.4
Sick, B.5
-
28
-
-
33745469440
-
-
May
-
IANA, "Port Numbers," http://www.iana.org/assignments/ port-numbers, May 2009.
-
(2009)
Port Numbers
-
-
-
29
-
-
0003509661
-
-
Mar.
-
Y. Rekhter, B. Moskowitz, D. Karrenberg, and G. de Groot, "RFC 1597-Address Allocation for Private Internets," http://www. faqs.org/rfcs/rfc1597.html, Mar. 1994.
-
(1994)
RFC 1597-Address Allocation for Private Internets
-
-
Rekhter, Y.1
Moskowitz, B.2
Karrenberg, D.3
De Groot, G.4
-
31
-
-
34250726963
-
Fast and efficient training of RBF networks
-
O. Kaynak, E. Alpaydin, E. Oja, and L. Xu, eds. Springer
-
O. Buchtala, A. Hofmann, and B. Sick, "Fast and Efficient Training of RBF Networks," Artificial Neural Networks and Neural Information Processing-ICANN/ICONIP 2003, O. Kaynak, E. Alpaydin, E. Oja, and L. Xu, eds., pp. 43-51, Springer, 2003.
-
Artificial Neural Networks and Neural Information Processing-ICANN/ICONIP 2003
, vol.2003
, pp. 43-51
-
-
Buchtala, O.1
Hofmann, A.2
Sick, B.3
-
32
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA offline intrusion detection evaluation
-
R.P. Lippmann, D.J. Fried, I. Graf, J.W. Haines, K.R. Kendall, D. McClung, D. Weber, S.E. Webster, D. Wyschogrod, R.K. Cunningham, and M.A. Zissman, "Evaluating Intrusion Detection Systems: The 1998 DARPA Offline Intrusion Detection Evaluation," Proc. DARPA Information Survivability Conf. and Exposition (DISCEX), vol. 2, pp. 12-26, 2000.
-
(2000)
Proc. DARPA Information Survivability Conf. and Exposition (DISCEX)
, vol.2
, pp. 12-26
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
33
-
-
0035676057
-
On clustering validation techniques
-
M. Halkidi, Y. Batistakis, and M. Vazirgiannis, "On Clustering Validation Techniques," J. Intelligent Information Systems, vol. 17, nos. 2/3, pp. 107-145, 2001.
-
(2001)
J. Intelligent Information Systems
, vol.17
, Issue.2-3
, pp. 107-145
-
-
Halkidi, M.1
Batistakis, Y.2
Vazirgiannis, M.3
-
34
-
-
84941155240
-
Well separated clusters and optimal fuzzy partitions
-
J.C. Dunn, "Well Separated Clusters and Optimal Fuzzy Partitions," J. Cybernetics, vol. 4, pp. 95-104, 1974.
-
(1974)
J. Cybernetics
, vol.4
, pp. 95-104
-
-
Dunn, J.C.1
-
35
-
-
0017953820
-
A cluster separation measure
-
Apr.
-
D.L. Davies and D.W. Bouldin, "A Cluster Separation Measure," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 1, no. 2, pp. 224-227, Apr. 1979.
-
(1979)
IEEE Trans. Pattern Analysis and Machine Intelligence
, vol.1
, Issue.2
, pp. 224-227
-
-
Davies, D.L.1
Bouldin, D.W.2
-
36
-
-
0242635232
-
Clustering validity assessment using multi representatives
-
M. Halkidi and M. Vazirgiannis, "Clustering Validity Assessment Using Multi Representatives," Proc. SETN Conf., vol. 2, pp. 237- 249, 2002.
-
(2002)
Proc. SETN Conf.
, vol.2
, pp. 237-249
-
-
Halkidi, M.1
Vazirgiannis, M.2
-
37
-
-
48049102734
-
A novelty- driven approach to intrusion alert correlation based on distributed hash tables
-
A. Hofmann, I. Dedinski, B. Sick, and H. de Meer, "A Novelty- Driven Approach to Intrusion Alert Correlation Based on Distributed Hash Tables," Proc. 12th IEEE Symp. Computers and Comm. (ISCC '07), pp. 71-78, 2007.
-
(2007)
Proc. 12th IEEE Symp. Computers and Comm. (ISCC '07)
, pp. 71-78
-
-
Hofmann, A.1
Dedinski, I.2
Sick, B.3
De Meer, H.4
-
39
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory
-
J. McHugh, "Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory," ACM Trans. Information and System Security, vol. 3, no. 4, pp. 262-294, 2000.
-
(2000)
ACM Trans. Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
40
-
-
35248857893
-
An analysis of the 1999 DARPA/ Lincoln laboratory evaluation data for network anomaly detection
-
G. Vigna, E. Jonsson, and C. Krügel, eds. Springer
-
M.V. Mahoney and P.K. Chan, "An Analysis of the 1999 DARPA/ Lincoln Laboratory Evaluation Data for Network Anomaly Detection," Recent Advances in Intrusion Detection, G. Vigna, E. Jonsson, and C. Krügel, eds., pp. 220-237, Springer, 2003.
-
(2003)
Recent Advances in Intrusion Detection
, pp. 220-237
-
-
Mahoney, M.V.1
Chan, P.K.2
-
41
-
-
77950026796
-
Improving intrusion detection training data by network traffic variation
-
A. Hofmann, D. Fisch, and B. Sick, "Improving Intrusion Detection Training Data by Network Traffic Variation," Proc. IEEE Three-Rivers Workshop Soft Computing in Industrial Applications, pp. 25-31, 2007.
-
(2007)
Proc. IEEE Three-Rivers Workshop Soft Computing in Industrial Applications
, pp. 25-31
-
-
Hofmann, A.1
Fisch, D.2
Sick, B.3
-
42
-
-
78751662425
-
-
Sourcefire Inc.
-
Sourcefire, Inc., http://www.snort.org/, 2009.
-
(2009)
-
-
|