메뉴 건너뛰기




Volumn 37, Issue 10, 2010, Pages 7138-7146

An ontology-based intrusion alerts correlation system

Author keywords

Alert correlation; Intrusion detection; Ontology; System integration and implementation

Indexed keywords

MERCURY (METAL); MULTI AGENT SYSTEMS; ONTOLOGY;

EID: 81355154787     PISSN: 09574174     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.eswa.2010.03.068     Document Type: Article
Times cited : (35)

References (45)
  • 1
    • 33846203280 scopus 로고    scopus 로고
    • DR-prolog: A system for defeasible reasoning with rules and ontologies on the semantic Web
    • DOI 10.1109/TKDE.2007.29
    • Antoniou, G., & Bikakis, A. (2007). DR-Prolog: A system for defeasible reasoning with rules and ontologies on the semantic web. IEEE Transactions on Knowledge and Data Engineering, 19(2), 233-245. (Pubitemid 46104026)
    • (2007) IEEE Transactions on Knowledge and Data Engineering , vol.19 , Issue.2 , pp. 233-245
    • Antoniou, G.1    Bikakis, A.2
  • 2
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and its implication for the difficulty of intrusion detection
    • Axelsson, S. (2000). The base-rate fallacy and its implication for the difficulty of intrusion detection. ACM Transactions on Information and System Security, 3(3), 186-205.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 7
    • 85031212977 scopus 로고    scopus 로고
    • Common vulnerabilities and exposures (CVE)
    • Accessed 25.06.09
    • CVE (2009). Common vulnerabilities and exposures (CVE). MITRE Corporation. Accessed 25.06.09.
    • (2009) MITRE Corporation
  • 11
    • 84947561772 scopus 로고    scopus 로고
    • Aggregation and Correlation of Intrusion-Detection Alerts
    • Recent Advances in Intrusion Detection
    • Debar, H., & Wespi, A. (2001). Aggregation and correlation of intrusion-detection alerts. In Proceedings of the 4th international symposium on recent advances in intrusion detection (RAID 2001). Lecture Notes in Computer Science (Vol. 2212, pp. 85-103). Springer-Verlag. (Pubitemid 33352002)
    • (2001) Lecture Notes in Computer Science , Issue.2212 , pp. 85-103
    • Debar, H.1    Wespi, A.2
  • 13
    • 85031233395 scopus 로고    scopus 로고
    • Accessed 25.06.09
    • DIG (2009). Accessed 25.06.09.
    • (2009) DIG
  • 14
    • 85031215708 scopus 로고    scopus 로고
    • Accessed 25.06.09
    • dom4j (2009). Accessed 25.06.09.
    • (2009) Dom4j
  • 15
    • 0036090387 scopus 로고    scopus 로고
    • STATL: An attack language for state-based intrusion detection
    • Eckmann, S. T., Vigna, G., & Kemmerer, R. A. (2002). STATL: An attack language for state-based intrusion detection. Journal of Computer Security, 10(1), 71-104.
    • (2002) Journal of Computer Security , vol.10 , Issue.1 , pp. 71-104
    • Eckmann, S.T.1    Vigna, G.2    Kemmerer, R.A.3
  • 16
    • 33748743358 scopus 로고    scopus 로고
    • Accessed 25.06.09
    • FaCT++, (2009). Accessed 25.06.09.
    • (2009) FaCT++
  • 18
    • 35148839490 scopus 로고
    • A translation approach to portable ontologies
    • Gruber, T. F. (1993). A translation approach to portable ontologies. Knowledge Acquisition, 5(2), 99-220.
    • (1993) Knowledge Acquisition , vol.5 , Issue.2 , pp. 99-220
    • Gruber, T.F.1
  • 22
    • 21244467061 scopus 로고    scopus 로고
    • OWL rules: A proposal and prototype implementation
    • DOI 10.1016/j.websem.2005.05.003, PII S1570826805000053, Rules Systems
    • Horrocks, I., Patel-Schneider, P. F., Bechhofer, S., & Tsarkov, D. (2005). OWL rules: a proposal and prototype implementation. Journal of Web Semantics, 3(1), 23-40. (Pubitemid 40891657)
    • (2005) Web Semantics , vol.3 , Issue.1 , pp. 23-40
    • Horrocks, I.1    Patel-Schneider, P.F.2    Bechhofer, S.3    Tsarkov, D.4
  • 23
    • 85031218382 scopus 로고    scopus 로고
    • Accessed 25.06.09
    • Jess (2009). Accessed 25.06.09.
    • (2009) Jess
  • 29
    • 54749089198 scopus 로고    scopus 로고
    • Ph. D. dissertation, Beijing Jiaotong University, Beijing, China in Chinese
    • Mu, C. (2006). Research on automated intrusion response system. Ph. D. dissertation, Beijing Jiaotong University, Beijing, China [in Chinese].
    • (2006) Research on Automated Intrusion Response System
    • Mu, C.1
  • 32
    • 14544283296 scopus 로고    scopus 로고
    • Hypothesizing and reasoning about attacks missed by intrusion detection systems
    • Ning, P., & Xu, D. (2004). Hypothesizing and reasoning about attacks missed by intrusion detection systems. ACM Transactions on Information and System Security, 7(4), 1-37.
    • (2004) ACM Transactions on Information and System Security , vol.7 , Issue.4 , pp. 1-37
    • Ning, P.1    Xu, D.2
  • 34
    • 84863602208 scopus 로고    scopus 로고
    • Accessed 25.06.09
    • Protégé (2009). Accessed 25.06.09.
    • (2009) Protégé
  • 35
    • 85031217568 scopus 로고    scopus 로고
    • Accessed 25.06.09
    • Racer (2009). Accessed 25.06.09.
    • (2009) Racer
  • 40
    • 84947603083 scopus 로고    scopus 로고
    • Probabilistic alert correlation
    • Recent Advances in Intrusion Detection
    • Valdes, A., & Skinner, K. (2001). Probabilistic alert correlation. In Proceedings of the 4th international symposium on recent advances in intrusion detection (RAID 2001). Lecture notes in computer science (Vol. 2212, pp. 54-68). Springer-Verlag. (Pubitemid 33352000)
    • (2001) Lecture Notes in Computer Science , Issue.2212 , pp. 54-68
    • Valdes, A.1    Skinner, K.2
  • 42
    • 33747210407 scopus 로고    scopus 로고
    • Description logics for an autonomic IDS event analysis system
    • Yan, W., Hou, E., & Ansari, N. (2006). Description logics for an autonomic IDS event analysis system. Computer Communications, 29(15), 2841-2852.
    • (2006) Computer Communications , vol.29 , Issue.15 , pp. 2841-2852
    • Yan, W.1    Hou, E.2    Ansari, N.3
  • 43
    • 33751243928 scopus 로고    scopus 로고
    • Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net
    • DOI 10.1016/j.comnet.2006.05.008, PII S1389128606001290
    • Yu, D., & Frincke, D. (2007). Improving the quality of alerts and predicting intruder's next goal with hidden colored petri-net. Computer Networks, 51(3), 632-654. (Pubitemid 44792518)
    • (2007) Computer Networks , vol.51 , Issue.3 , pp. 632-654
    • Yu, D.1    Frincke, D.2
  • 44
    • 33749494533 scopus 로고    scopus 로고
    • Network attack plan recognition algorithm based on the extended goal graph
    • Zhuge, J., Han, X., Ye, Z., & Zou, W. (2006). A network attack plan recognition algorithm based on the extended goal graph. Chinese Journal of Computers, 29(8), 1356-1366 [in Chinese]. (Pubitemid 44513480)
    • (2006) Jisuanji Xuebao/Chinese Journal of Computers , vol.29 , Issue.8 , pp. 1356-1366
    • Zhuge, J.-W.1    Han, X.-H.2    Ye, Z.-Y.3    Zou, W.4
  • 45
    • 5644229746 scopus 로고    scopus 로고
    • An attack knowledge model based on objectoriented technology
    • in Chinese
    • Zhuge, J., Xu, H., & Pan, A. (2004). An attack knowledge model based on objectoriented technology. Journal of Computer Research and Development, 41(7), 1110-1116 [in Chinese].
    • (2004) Journal of Computer Research and Development , vol.41 , Issue.7 , pp. 1110-1116
    • Zhuge, J.1    Xu, H.2    Pan, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.