-
1
-
-
35048875337
-
Simplifying correlation rule creation for effective systems monitoring
-
DSOM, Davis, CA, USA
-
C. Araujo, A. Biazetti, A. Bussani, J. Dinger, M. Feridun, and A. Tanner, "Simplifying correlation rule creation for effective systems monitoring," 15th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM, Davis, CA, USA, pp. 266-268, 2004.
-
(2004)
15th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management
, pp. 266-268
-
-
Araujo, C.1
Biazetti, A.2
Bussani, A.3
Dinger, J.4
Feridun, M.5
Tanner, A.6
-
2
-
-
35248849693
-
Enhanced correlation in an intrusion detection process
-
S. Benferhat, F. Autrel, F. Cuppens, "Enhanced correlation in an intrusion detection process," Second International Workshop Mathematical Methods, Models and Architectures for Computer Networks Security, pp. 157-170, 2003.
-
(2003)
Second International Workshop Mathematical Methods, Models and Architectures for Computer Networks Security
, pp. 157-170
-
-
Benferhat, S.1
Autrel, F.2
Cuppens, F.3
-
3
-
-
84922794799
-
Managing alerts in multi-intrusion detection environment
-
December
-
F. Cuppens, "Managing alerts in multi-intrusion detection environment," 17th ACSAC conference, New Orleans, pp. 22, December 2001.
-
(2001)
17th ACSAC conference, New Orleans
, pp. 22
-
-
Cuppens, F.1
-
4
-
-
0036079912
-
Alert correlation in a cooperative intrusion detection framework
-
May, Oakland
-
F. Cuppens, A. Miuege, "Alert correlation in a cooperative intrusion detection framework," IEEE symposium on security and privacy, Oakland, pp. 202, May 2002.
-
(2002)
IEEE symposium on security and privacy
, pp. 202
-
-
Cuppens, F.1
Miuege, A.2
-
5
-
-
84949215209
-
Mining alarm clusters to improve alarm handling eciency
-
New Orleans, LA, USA
-
K. Julisch, "Mining alarm clusters to improve alarm handling eciency," 17th Annual Computer Security Applications Conference, New Orleans, LA, USA, pp.0012, 2001.
-
(2001)
17th Annual Computer Security Applications Conference
, pp. 0012
-
-
Julisch, K.1
-
6
-
-
3142623031
-
Clustering intrusion detection alarms to support root cause analysis
-
K. Julisch, "Clustering intrusion detection alarms to support root cause analysis," ACM Transaction on Information and System Security, vol. 6, pp. 443-471, 2003.
-
(2003)
ACM Transaction on Information and System Security
, vol.6
, pp. 443-471
-
-
Julisch, K.1
-
7
-
-
74049131441
-
A Rule-based Temporal Alert Correlation System
-
P. Kabiri and A. A. Ghorbani, "A Rule-based Temporal Alert Correlation System," International Journal of Network Security, vol. 5, no. 1, pp. 66-72, 2007.
-
(2007)
International Journal of Network Security
, vol.5
, Issue.1
, pp. 66-72
-
-
Kabiri, P.1
Ghorbani, A.A.2
-
8
-
-
33646844014
-
Statistical causality analysis of INFOSEC alert data
-
W. Lee and X. Qin, "Statistical causality analysis of INFOSEC alert data," RAID'03, pp. 73-93, 2003.
-
(2003)
RAID'03
, pp. 73-93
-
-
Lee, W.1
Qin, X.2
-
9
-
-
35148893691
-
Attack scenario construction with a new sequential mining technique
-
W. Li, Z. T. Li, J. Lei, D. Li, "Attack scenario construction with a new sequential mining technique," SNPD'07, pp. 872-877, 2007.
-
(2007)
SNPD'07
, pp. 872-877
-
-
Li, W.1
Li, Z.T.2
Lei, J.3
Li, D.4
-
10
-
-
84875307813
-
-
MIT Lincoln Lab. 2000 DARPA Intrusion Detection Scenario Specific Data Sets
-
MIT Lincoln Lab. 2000 DARPA Intrusion Detection Scenario Specific Data Sets. (http:// www.ll.mit. edu/ IST/ideval/data/2000/2000 dataindex.html)
-
-
-
-
11
-
-
84875312202
-
-
MIT Lincoln Lab. Tcpdump File Replay Utility
-
MIT Lincoln Lab. Tcpdump File Replay Utility. (http://ideval.ll.mit.edu/IST/ideval/tools/ toolsindex.html)
-
-
-
-
12
-
-
0038011185
-
Constructing attack scenarios through correlation of intrusion alerts
-
Washington, DC, United States
-
P. Ning, Y. Cui, and D. S. Reeves, "Constructing attack scenarios through correlation of intrusion alerts," 9th ACM Conference on Computer and Communications Security, Washington, DC, United States, pp. 245-254, 2002.
-
(2002)
9th ACM Conference on Computer and Communications Security
, pp. 245-254
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
13
-
-
3142632087
-
Techniques and tools for analyzing intrusion alerts
-
P. Ning, Y. Cui, D. S. Reeves, and D. Xu, "Techniques and tools for analyzing intrusion alerts," ACM Transactions on Information and System Security, vol. 7, pp. 274, 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, pp. 274
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
Xu, D.4
-
14
-
-
21644452488
-
Alert correlation through triggering events and common resources
-
Tucson, AZ, USA
-
P. Ning and D. Xu, "Alert correlation through triggering events and common resources," ACSAC'04, Tucson, AZ, USA, pp. 360-369, 2004.
-
(2004)
ACSAC'04
, pp. 360-369
-
-
Ning, P.1
Xu, D.2
-
15
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing, "Automated generation and analysis of attack graphs," Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 273, May 2002.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 273
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
16
-
-
84870573304
-
Performance analysis of soft computing based anomaly detectors
-
N. Srinivasan and V. Vaidehi, "Performance analysis of soft computing based anomaly detectors," International Journal of Network Security, vol. 7, no. 3, pp. 436-447, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.3
, pp. 436-447
-
-
Srinivasan, N.1
Vaidehi, V.2
-
18
-
-
35048901618
-
Discovering novel attack strategies from INFOSEC alerts
-
Q. Xinzhou and L. Wenke, "Discovering novel attack strategies from INFOSEC alerts," ESORICS'04, pp. 439-456, 2004.
-
(2004)
ESORICS'04
, pp. 439-456
-
-
Xinzhou, Q.1
Wenke, L.2
-
19
-
-
38149027709
-
Alert correlation for extracting attack strategies
-
A. Zhu and A. A. Ghorbani, "Alert correlation for extracting attack strategies," International Journal of Network Security, vol. 3, no. 3, pp. 244-258, 2006.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.3
, pp. 244-258
-
-
Zhu, A.1
Ghorbani, A.A.2
-
20
-
-
84874795738
-
On the effectiveness of continuous-time mixes under ow-correlation based anonymity attacks
-
Y. Zhu, X. Fu, and R. Bettati, "On the effectiveness of continuous-time mixes under ow-correlation based anonymity attacks," International Journal of Network Security, vol. 7, no. 1, pp. 130-140, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.1
, pp. 130-140
-
-
Zhu, Y.1
Fu, X.2
Bettati, R.3
|