메뉴 건너뛰기




Volumn 10, Issue 2, 2010, Pages 142-152

Automatic multi-step attack pattern discovering

Author keywords

Alert correlation; Correlativity; Extension time window; Multi step attack pattern

Indexed keywords

ALERT CORRELATION; ATTACK PATTERNS; COMPUTING WORKLOADS; CORRELATIVITY; MULTI-STEP ATTACKS; QUANTITATIVE CORRELATION; SECURITY ALERTS; TIME WINDOWS;

EID: 79959289473     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (25)

References (20)
  • 3
    • 84922794799 scopus 로고    scopus 로고
    • Managing alerts in multi-intrusion detection environment
    • December
    • F. Cuppens, "Managing alerts in multi-intrusion detection environment," 17th ACSAC conference, New Orleans, pp. 22, December 2001.
    • (2001) 17th ACSAC conference, New Orleans , pp. 22
    • Cuppens, F.1
  • 4
    • 0036079912 scopus 로고    scopus 로고
    • Alert correlation in a cooperative intrusion detection framework
    • May, Oakland
    • F. Cuppens, A. Miuege, "Alert correlation in a cooperative intrusion detection framework," IEEE symposium on security and privacy, Oakland, pp. 202, May 2002.
    • (2002) IEEE symposium on security and privacy , pp. 202
    • Cuppens, F.1    Miuege, A.2
  • 5
    • 84949215209 scopus 로고    scopus 로고
    • Mining alarm clusters to improve alarm handling eciency
    • New Orleans, LA, USA
    • K. Julisch, "Mining alarm clusters to improve alarm handling eciency," 17th Annual Computer Security Applications Conference, New Orleans, LA, USA, pp.0012, 2001.
    • (2001) 17th Annual Computer Security Applications Conference , pp. 0012
    • Julisch, K.1
  • 6
    • 3142623031 scopus 로고    scopus 로고
    • Clustering intrusion detection alarms to support root cause analysis
    • K. Julisch, "Clustering intrusion detection alarms to support root cause analysis," ACM Transaction on Information and System Security, vol. 6, pp. 443-471, 2003.
    • (2003) ACM Transaction on Information and System Security , vol.6 , pp. 443-471
    • Julisch, K.1
  • 8
    • 33646844014 scopus 로고    scopus 로고
    • Statistical causality analysis of INFOSEC alert data
    • W. Lee and X. Qin, "Statistical causality analysis of INFOSEC alert data," RAID'03, pp. 73-93, 2003.
    • (2003) RAID'03 , pp. 73-93
    • Lee, W.1    Qin, X.2
  • 9
    • 35148893691 scopus 로고    scopus 로고
    • Attack scenario construction with a new sequential mining technique
    • W. Li, Z. T. Li, J. Lei, D. Li, "Attack scenario construction with a new sequential mining technique," SNPD'07, pp. 872-877, 2007.
    • (2007) SNPD'07 , pp. 872-877
    • Li, W.1    Li, Z.T.2    Lei, J.3    Li, D.4
  • 10
    • 84875307813 scopus 로고    scopus 로고
    • MIT Lincoln Lab. 2000 DARPA Intrusion Detection Scenario Specific Data Sets
    • MIT Lincoln Lab. 2000 DARPA Intrusion Detection Scenario Specific Data Sets. (http:// www.ll.mit. edu/ IST/ideval/data/2000/2000 dataindex.html)
  • 11
    • 84875312202 scopus 로고    scopus 로고
    • MIT Lincoln Lab. Tcpdump File Replay Utility
    • MIT Lincoln Lab. Tcpdump File Replay Utility. (http://ideval.ll.mit.edu/IST/ideval/tools/ toolsindex.html)
  • 12
    • 0038011185 scopus 로고    scopus 로고
    • Constructing attack scenarios through correlation of intrusion alerts
    • Washington, DC, United States
    • P. Ning, Y. Cui, and D. S. Reeves, "Constructing attack scenarios through correlation of intrusion alerts," 9th ACM Conference on Computer and Communications Security, Washington, DC, United States, pp. 245-254, 2002.
    • (2002) 9th ACM Conference on Computer and Communications Security , pp. 245-254
    • Ning, P.1    Cui, Y.2    Reeves, D.S.3
  • 14
    • 21644452488 scopus 로고    scopus 로고
    • Alert correlation through triggering events and common resources
    • Tucson, AZ, USA
    • P. Ning and D. Xu, "Alert correlation through triggering events and common resources," ACSAC'04, Tucson, AZ, USA, pp. 360-369, 2004.
    • (2004) ACSAC'04 , pp. 360-369
    • Ning, P.1    Xu, D.2
  • 16
    • 84870573304 scopus 로고    scopus 로고
    • Performance analysis of soft computing based anomaly detectors
    • N. Srinivasan and V. Vaidehi, "Performance analysis of soft computing based anomaly detectors," International Journal of Network Security, vol. 7, no. 3, pp. 436-447, 2008.
    • (2008) International Journal of Network Security , vol.7 , Issue.3 , pp. 436-447
    • Srinivasan, N.1    Vaidehi, V.2
  • 18
    • 35048901618 scopus 로고    scopus 로고
    • Discovering novel attack strategies from INFOSEC alerts
    • Q. Xinzhou and L. Wenke, "Discovering novel attack strategies from INFOSEC alerts," ESORICS'04, pp. 439-456, 2004.
    • (2004) ESORICS'04 , pp. 439-456
    • Xinzhou, Q.1    Wenke, L.2
  • 19
    • 38149027709 scopus 로고    scopus 로고
    • Alert correlation for extracting attack strategies
    • A. Zhu and A. A. Ghorbani, "Alert correlation for extracting attack strategies," International Journal of Network Security, vol. 3, no. 3, pp. 244-258, 2006.
    • (2006) International Journal of Network Security , vol.3 , Issue.3 , pp. 244-258
    • Zhu, A.1    Ghorbani, A.A.2
  • 20
    • 84874795738 scopus 로고    scopus 로고
    • On the effectiveness of continuous-time mixes under ow-correlation based anonymity attacks
    • Y. Zhu, X. Fu, and R. Bettati, "On the effectiveness of continuous-time mixes under ow-correlation based anonymity attacks," International Journal of Network Security, vol. 7, no. 1, pp. 130-140, 2008.
    • (2008) International Journal of Network Security , vol.7 , Issue.1 , pp. 130-140
    • Zhu, Y.1    Fu, X.2    Bettati, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.