메뉴 건너뛰기




Volumn , Issue , 2004, Pages

Building Attack Scenarios through Integration of Complementary Alert Correlation Methods

Author keywords

[No Author keywords available]

Indexed keywords

INTRUSION DETECTION; NETWORK SECURITY;

EID: 79958186026     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (120)

References (27)
  • 9
    • 84947561772 scopus 로고    scopus 로고
    • Aggregation and correlation of intrusion-detection alerts
    • H. Debar and A. Wespi. Aggregation and correlation of intrusion-detection alerts. In Recent Advances in Intrusion Detection, LNCS 2212, pages 85 – 103, 2001.
    • (2001) Recent Advances in Intrusion Detection, LNCS , vol.2212 , pp. 85-103
    • Debar, H.1    Wespi, A.2
  • 10
    • 0036090387 scopus 로고    scopus 로고
    • STATL: An Attack Language for State-based Intrusion Detection
    • (1/2)
    • S. Eckmann, G. Vigna, and R. Kemmerer. STATL: An Attack Language for State-based Intrusion Detection. Journal of Computer Security, 10(1/2):71–104, 2002.
    • (2002) Journal of Computer Security , vol.10 , pp. 71-104
    • Eckmann, S.1    Vigna, G.2    Kemmerer, R.3
  • 23
    • 0036093547 scopus 로고    scopus 로고
    • Model-based analysis of configuration vulnerabilities
    • (/2)
    • C. Ramakrishnan and R. Sekar. Model-based analysis of configuration vulnerabilities. Journal of Computer Security, 10(1/2):189–209, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.1 , pp. 189-209
    • Ramakrishnan, C.1    Sekar, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.