-
1
-
-
58149488644
-
Intrusion detection alarms reduction using root cause analysis and clustering
-
S.O. Al-Mamory, and H. Zhang Intrusion detection alarms reduction using root cause analysis and clustering Computer Communications 32 2009 419 430
-
(2009)
Computer Communications
, vol.32
, pp. 419-430
-
-
Al-Mamory, S.O.1
Zhang, H.2
-
8
-
-
0036079912
-
Alert correlation in a cooperative intrusion detection framework
-
Berkeley, California, USA, May
-
F. Cuppens, A. Miege, Alert correlation in a cooperative intrusion detection framework, in: Proceedings of the 2002 IEEE Symposium on Security and Privacy, IEEE Computer Society, Berkeley, California, USA, May 2002, p. 202
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy, IEEE Computer Society
, pp. 202
-
-
Cuppens, F.1
Miege, A.2
-
9
-
-
10444226846
-
Recognizing malicious intention in an intrusion detection process
-
Special session: "Hybrid Intelligent Systems for Intrusion Detection", December
-
F. Cuppens, F. Autrel, A. Miege, S. Benferhat, Recognizing malicious intention in an intrusion detection process, in: Second International Conference on Hybrid Intelligent Systems, Santiago, Chili. Special session: "Hybrid Intelligent Systems for Intrusion Detection", December 2002.
-
(2002)
Second International Conference on Hybrid Intelligent Systems, Santiago, Chili
-
-
Cuppens, F.1
Autrel, F.2
Miege, A.3
Benferhat, S.4
-
12
-
-
84947561772
-
Aggregation and Correlation of Intrusion-Detection Alerts
-
Recent Advances in Intrusion Detection
-
H. Debar, and A. Wespi Aggregation and correlation of intrusion-detection alerts Proceedings of the 4th International Symposium on Recent Advances in Intrusion detection (RAID) 2001 Springer Verlag California, USA 85 103 (Pubitemid 33352002)
-
(2001)
Lect. Notes Comput. Sci.
, Issue.2212
, pp. 85-103
-
-
Debar, H.1
Wespi, A.2
-
13
-
-
25844491810
-
An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
-
DOI 10.1016/j.eswa.2005.05.002, PII S0957417405000989
-
O. Depren, M. Topallar, E. Anarim, and M.K. Ciliz An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks Expert Systems with Applications 29 2005 713 722 (Pubitemid 41394445)
-
(2005)
Expert Systems with Applications
, vol.29
, Issue.4
, pp. 713-722
-
-
Depren, O.1
Topallar, M.2
Anarim, E.3
Ciliz, M.K.4
-
14
-
-
68949196337
-
A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
-
X.D. Hoang, J. Hu, and P. Bertok A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference Journal of Network and Computer Applications 32 2009 1219 1228
-
(2009)
Journal of Network and Computer Applications
, vol.32
, pp. 1219-1228
-
-
Hoang, X.D.1
Hu, J.2
Bertok, P.3
-
15
-
-
33847617890
-
Intrusion Detection Aware Component-based Systems: A Specification-based Framework
-
School of Computing, Queen's University, Kingston, Ont., Canada K7L 3N6, 27
-
M. Hussein, M. Zulkernine, Intrusion detection aware component-based systems: a specification-based framework, School of Computing, Queen's University, Kingston, Ont., Canada K7L 3N6, 27, The Journal of Systems and Software 80 (2007) 700-710.
-
(2007)
The Journal of Systems and Software
, vol.80
, pp. 700-710
-
-
Hussein, M.1
Zulkernine, M.2
-
17
-
-
33847743856
-
Hybrid intrusion detection with weighted signature generation over anomalous internet episodes
-
K. Hwang, M. Cai, Y. Chen, M. Qin, Hybrid intrusion detection with weighted signature generation over anomalous internet episodes, IEEE Transactions on Dependable and Secure Computing 4 (1) (2007).
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.1
-
-
Hwang, K.1
Cai, M.2
Chen, Y.3
Qin, M.4
-
22
-
-
79960561313
-
Collaborating Against Common Enemies, USENIX Association
-
October
-
S. Katti, B. Krishnamurthy, D. Katabi, Collaborating Against Common Enemies, USENIX Association, Internet Measurement Conference 2005, October 2005, pp. 365-378.
-
(2005)
Internet Measurement Conference 2005
, pp. 365-378
-
-
Katti, S.1
Krishnamurthy, B.2
Katabi, D.3
-
24
-
-
66449085932
-
Reducing false positives in anomaly detectors through fuzzy alert aggregation
-
F. Maggi, M. Matteucci, and S. Zanero Reducing false positives in anomaly detectors through fuzzy alert aggregation Information Fusion 10 2009 300 311
-
(2009)
Information Fusion
, vol.10
, pp. 300-311
-
-
Maggi, F.1
Matteucci, M.2
Zanero, S.3
-
26
-
-
33646160004
-
Correlation of intrusion symptoms: An application of chronicles
-
G. Vigna, E. Jonsson, C. Krgel (Eds.) Springer, September
-
B. Morin, H. Debar, Correlation of intrusion symptoms: an application of chronicles, in: G. Vigna, E. Jonsson, C. Krgel (Eds.), Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection (RAID2003), Lecture Notes in Computer Science, vol. 2820, Springer, September 2003, pp. 94-112.
-
(2003)
Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection (RAID2003), Lecture Notes in Computer Science
, vol.2820
, pp. 94-112
-
-
Morin, B.1
Debar, H.2
-
27
-
-
79957459946
-
-
Elsevier Ltd., January
-
B. Morin, L. Me, H. Debar, M. Ducasse, M4D4: A Logical Framework to Support Alert Correlation in Intrusion Detection, Elsevier Ltd., January 2008.
-
(2008)
M4D4: A Logical Framework to Support Alert Correlation in Intrusion Detection
-
-
Morin, B.1
Me, L.2
Debar, H.3
Ducasse, M.4
-
28
-
-
67349242974
-
A logic-based model to support alert correlation in intrusion detection
-
B. Morin, L. M, H. Debar, M. Ducass, A logic-based model to support alert correlation in intrusion detection, Information Fusion 10 (2009) 285-299.
-
(2009)
Information Fusion
, vol.10
, pp. 285-299
-
-
Morin, B.1
M, L.2
Debar, H.3
Ducass, M.4
-
29
-
-
84883386223
-
Abstraction-based intrusion detection in distributed environments
-
P. Ning, S. Jajodia, X.S. Wang, Abstraction-based intrusion detection in distributed environments, CM Transaction on Information and System Security (TISSEC) 4 (4) (2001) 407-452.
-
(2001)
CM Transaction on Information and System Security (TISSEC)
, vol.4
, Issue.4
, pp. 407-452
-
-
Ning, P.1
Jajodia, S.2
Wang, X.S.3
-
30
-
-
4243538338
-
Adapting query optimization techniques for efficient intrusion alert correlation
-
NCSU, Department of Computer Science
-
P. Ning, D. Xu, Adapting query optimization techniques for efficient intrusion alert correlation, Technical report, NCSU, Department of Computer Science, 2002.
-
(2002)
Technical Report
-
-
Ning, P.1
Xu, D.2
-
31
-
-
1642351593
-
An Intrusion Alert Correlator based on Prerequisites of Intrusions
-
North Carolina State University, Department of Computer Science
-
P. Ning, D.S. Reeves, Y. Cui, An Intrusion Alert Correlator based on Prerequisites of Intrusions, Technical Report TR-2002-01, North Carolina State University, Department of Computer Science, 2002.
-
(2002)
Technical Report TR-2002-01
-
-
Ning, P.1
Reeves, D.S.2
Cui, Y.3
-
32
-
-
84958963784
-
Analyzing intensive intrusion alerts via correlation
-
Springer Verlang, Zurich, Switzerland, October
-
P. Ning, Y. Cui, D.S. Reeves, Analyzing intensive intrusion alerts via correlation, in: Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID), Springer Verlang, Zurich, Switzerland, October 2002, pp. 74-94.
-
(2002)
Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID)
, pp. 74-94
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
33
-
-
0038011185
-
Constructing attack scenarios through correlation of intrusion alerts
-
P. Ning, Y. Cui, and D.S. Reeves Constructing attack scenarios through correlation of intrusion alerts Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, D.C. November 2002 245 254
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, D.C.
, pp. 245-254
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
34
-
-
34347251028
-
Towards Automating Intrusion Alert Analysis
-
September
-
P. Ning, Y. Cui, D.S. Reeves, D. Xu, Towards Automating Intrusion Alert Analysis, in: 2003 Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, September 2003.
-
(2003)
2003 Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
Xu, D.4
-
36
-
-
79958186026
-
Building attack scenarios through integration of complementary alert correlation methods
-
February
-
P. Ning, D. Xu, C.G. Healey, R.S. Amant, Building attack scenarios through integration of complementary alert correlation methods, in: 11th Annual Network and Distributed System Security Symposium, February 2004.
-
(2004)
11th Annual Network and Distributed System Security Symposium
-
-
Ning, P.1
Xu, D.2
Healey, C.G.3
Amant, R.S.4
-
37
-
-
3142632087
-
Tools and techniques for analyzing intrusion alerts
-
P. Ning, Y. Cui, D.S. Reeves, and D. Xu Tools and techniques for analyzing intrusion alerts ACM Transactions on Information and System Security 7 2 2004 273 318
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.2
, pp. 273-318
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
Xu, D.4
-
38
-
-
14544283296
-
Hypothesizing and reasoning about attacks missed by intrusion detection systems
-
DOI 10.1145/1042031.1042036
-
P. Ning, and D. Xu Hypothesizing and reasoning about attacks missed by intrusion detection systems ACM Transactions on Information and System Security 7 4 2004 591 627 (Pubitemid 40302700)
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.4
, pp. 591-627
-
-
Ning, P.1
Xu, D.2
-
39
-
-
21644481812
-
Correlating intrusion events and building attack scenarios through attack graph distances
-
Proceedings - 20th Annual Computer Security Applications Conference, ACSAC 2004
-
S. Noel, E. Robertson, and S. Jajodia Correlating intrusion events and building attack scenarios through attack graph distances 20th Annual Computer Security Applications Conference (ACSAC'04) 2004 350 359 (Pubitemid 40931090)
-
(2004)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, pp. 350-359
-
-
Noel, S.1
Robertson, E.2
Jajodia, S.3
-
40
-
-
33750512162
-
Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening
-
DOI 10.1016/j.jnca.2005.06.002, PII S1084804505000433, Network and Information Security: A Computational Intelligence Approach
-
T. Ozyer, R. Alhajj, and K. Barker Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening Journal of Network and Computer Applications 30 2007 99 113 (Pubitemid 44666485)
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 99-113
-
-
Ozyer, T.1
Alhajj, R.2
Barker, K.3
-
43
-
-
72949099162
-
Intrusion detection systems
-
S. Jajodia (Series editor) Springer ISBN 978-0-387-77265-3, e-ISBN: 978-0-387-77266-0
-
R.D. Pietro, L.V. Mancini, Intrusion detection systems, in: S. Jajodia (Series editor), Handbook of Advances in Information Security, Springer, 2008, ISBN 978-0-387-77265-3, e-ISBN: 978-0-387-77266-0.
-
(2008)
Handbook of Advances in Information Security
-
-
Pietro, R.D.1
Mancini, L.V.2
-
45
-
-
79960561513
-
Cooperative intrusion detection for detecting novel attacks using realtime data mining approach
-
R. Pushparaj, and S. Bhuvana Cooperative intrusion detection for detecting novel attacks using realtime data mining approach Proceedings of ICSTC 2008 110 125
-
(2008)
Proceedings of ICSTC
, pp. 110-125
-
-
Pushparaj, R.1
Bhuvana, S.2
-
46
-
-
79960564131
-
-
CSICC 2008 Kish Island, Iran, March 9-11,. Revised Selected Papers Series: H. Sarbazi-Azad, B. Parhami, S.-G. Miremadi, S. Hessabi (Eds.), Communications in Computer and Information Science, Springer, 2009, XXI, 1017 ISBN: 978-3-540-89984-6.
-
A. Rasoulifard, A.G. Bafghi, M. Kahani, Incremental Hybrid Intrusion Detection Using Ensemble of Weak Classifiers, Advances in Computer Science and Engineering, 13th International CSI Computer Conference, CSICC 2008 Kish Island, Iran, March 9-11, 2008. Revised Selected Papers Series: H. Sarbazi-Azad, B. Parhami, S.-G. Miremadi, S. Hessabi (Eds.), Communications in Computer and Information Science, vol. 6, Springer, 2009, XXI, 1017 pp., ISBN: 978-3-540-89984-6. http://prof.um.ac.ir/ResearchDocuments/papers/1009661.pdf.
-
(2008)
Incremental Hybrid Intrusion Detection Using Ensemble of Weak Classifiers, Advances in Computer Science and Engineering, 13th International CSI Computer Conference
, vol.6
-
-
Rasoulifard, A.1
Bafghi, A.G.2
Kahani, M.3
-
47
-
-
63049125148
-
An incremental frequent structure mining framework for real-time alert correlation
-
R. Sadoddin, and A.A. Ghorbani An incremental frequent structure mining framework for real-time alert correlation Computers Security 28 2009 153 173
-
(2009)
Computers Security
, vol.28
, pp. 153-173
-
-
Sadoddin, R.1
Ghorbani, A.A.2
-
48
-
-
33748619234
-
Applying genetic algorithm for classifying anomalous TCP/IP packets
-
DOI 10.1016/j.neucom.2006.01.023, PII S0925231206000907, Brain Inspired Cognitive Systems Selected papers from the 1st International Conference on Brain Inspired Cognitive Systems (BICS 2004)
-
T. Shon, X. Kovah, and J. Moon Applying genetic algorithm for classifying anomalous TCP/IP packets Neurocomputing 69 2006 2429 2433 (Pubitemid 44375533)
-
(2006)
Neurocomputing
, vol.69
, Issue.16-18
, pp. 2429-2433
-
-
Shon, T.1
Kovah, X.2
Moon, J.3
-
51
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
P.G. Teodoro, J.D. Verdejo, G.M. Fernandez, and E. Vazquez Anomaly-based network intrusion detection: techniques, systems and challenges Computers Security 28 2009 18 28
-
(2009)
Computers Security
, vol.28
, pp. 18-28
-
-
Teodoro, P.G.1
Verdejo, J.D.2
Fernandez, G.M.3
Vazquez, E.4
-
52
-
-
69349090629
-
A research using hybrid RBF/Elman neural networks for intrusion detection system secure model
-
X. Tong, Z. Wang, and H. Yu A research using hybrid RBF/Elman neural networks for intrusion detection system secure model Computer Physics Communications 180 2009 1795 1801
-
(2009)
Computer Physics Communications
, vol.180
, pp. 1795-1801
-
-
Tong, X.1
Wang, Z.2
Yu, H.3
-
53
-
-
34447639073
-
A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers
-
DOI 10.1016/j.comcom.2007.05.002, PII S0140366407001855
-
A.N. Toosi, and M. Kahani A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers Computer Communications 30 2007 2201 2212 (Pubitemid 47094963)
-
(2007)
Computer Communications
, vol.30
, Issue.10
, pp. 2201-2212
-
-
Toosi, A.N.1
Kahani, M.2
-
55
-
-
79960562753
-
-
in press
-
C.F. Tsai, Y.E. Hsu, C.Y. Lin, W.Y. Lin, Intrusion detection by machine learning: a review, Expert Systems with Applications, in press.
-
Intrusion Detection by Machine Learning: A Review, Expert Systems with Applications
-
-
Tsai, C.F.1
Hsu, Y.E.2
Lin, C.Y.3
Lin, W.Y.4
-
56
-
-
84947603083
-
Probabilistic Alert Correlation
-
Recent Advances in Intrusion Detection
-
A. Valdes, and K. Skinner Probabilistic alert correlation Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001) 2001 54 68 (Pubitemid 33352000)
-
(2001)
Lect. Notes Comput. Sci.
, Issue.2212
, pp. 54-68
-
-
Valdes, A.1
Skinner, K.2
-
58
-
-
70350134739
-
The use of computational intelligence in intrusion detection systems: A review
-
S.X. Wu, and W. Banzhaf The use of computational intelligence in intrusion detection systems: a review Applied Soft Computing Journal 10 2010 1 35
-
(2010)
Applied Soft Computing Journal
, vol.10
, pp. 1-35
-
-
Wu, S.X.1
Banzhaf, W.2
-
62
-
-
78049324449
-
Correlation analysis of intrusion alerts
-
R. Di Pietro, L.V. Mancini (Eds.) Springer ISBN 978-0-387-77265-3
-
D. Xu, P. Ning, Correlation analysis of intrusion alerts, in: R. Di Pietro, L.V. Mancini (Eds.), Intrusion Detection Systems, Advances in Information Security, vol. 38, Springer, 2008, pp. 65-92, ISBN 978-0-387-77265-3.
-
(2008)
Intrusion Detection Systems, Advances in Information Security
, vol.38
, pp. 65-92
-
-
Xu, D.1
Ning, P.2
-
63
-
-
23944456320
-
TRINETR: An architecture for collaborative intrusion detection and knowledge-based alert evaluation
-
DOI 10.1016/j.aei.2005.05.004, PII S1474034605000340, Collaorative Environment for Design and Manufacturing
-
J. Yu, Y.V.R. Reddy, S. Selliah, S. Reddy, V. Bharadwaj, and S. Kankanahalli TRINETR: an architecture for collaborative intrusion detection and knowledge-based alert evaluation Advanced Engineering Informatics 19 2005 93 101 (Pubitemid 41203511)
-
(2005)
Advanced Engineering Informatics
, vol.19
, Issue.2
, pp. 93-101
-
-
Yu, J.1
Reddy, Y.V.R.2
Selliah, S.3
Reddy, S.4
Bharadwaj, V.5
Kankanahalli, S.6
-
65
-
-
28444460711
-
Distributed intrusion detection based on clustering
-
Guangzhou, August
-
Y.F. Zhang, Z.Y. Xiong, X.Q. Wang, Distributed intrusion detection based on clustering, Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, Guangzhou, August 2005.
-
(2005)
Proceedings of the Fourth International Conference on Machine Learning and Cybernetics
-
-
Zhang, Y.F.1
Xiong, Z.Y.2
Wang, X.Q.3
-
67
-
-
67649433210
-
A survey of coordinated attacks and collaborative intrusion detection
-
in press
-
C.V. Zhou, C. Leckie, S. Karunasekera, A survey of coordinated attacks and collaborative intrusion detection, Computer Security, pp. 1-17, in press.
-
Computer Security
, pp. 1-17
-
-
Zhou, C.V.1
Leckie, C.2
Karunasekera, S.3
-
68
-
-
33847137650
-
Modeling network intrusion detection alerts for correlation
-
Article 4
-
J. Zhou, M. Heckman, B. Reynolds, A. Carlson, and M. Bishop Modeling network intrusion detection alerts for correlation ACM Transactions on Information and System Security 10 1 2007 Article 4
-
(2007)
ACM Transactions on Information and System Security
, vol.10
, Issue.1
-
-
Zhou, J.1
Heckman, M.2
Reynolds, B.3
Carlson, A.4
Bishop, M.5
-
71
-
-
79960561055
-
-
Intrusion detection message exchange message format (IDMEF), 2005
-
Intrusion detection message exchange message format (IDMEF), http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml-14.txt, 2005.
-
-
-
|