-
1
-
-
84900652504
-
-
An attack graph based approach for threat identification of an enterprise network. Cyber-security and Global Information Assurance: Threat Analysis and Response Solutions.
-
Ghosh SK, Bhattacharya S, Malhotra S. An attack graph based approach for threat identification of an enterprise network. Cyber-security and Global Information Assurance: Threat Analysis and Response Solutions 2009; pp. 23-45.
-
(2009)
, pp. 23-45
-
-
Ghosh, S.K.1
Bhattacharya, S.2
Malhotra, S.3
-
2
-
-
84944727025
-
-
Efficient minimum-cost network hardening via exploit dependency graphs. In Proceedings of the 19nd Annual Computer Security Applications Conference.
-
Noel S, Jajodia S, O'Berry B, Jacobs M. Efficient minimum-cost network hardening via exploit dependency graphs. In Proceedings of the 19nd Annual Computer Security Applications Conference, 2003; pp. 86-95.
-
(2003)
, pp. 86-95
-
-
Noel, S.1
Jajodia, S.2
O' Berry, B.3
Jacobs, M.4
-
4
-
-
70449521173
-
A rule-based cbr approach for expert finding and problem diagnosis
-
Tung YH, Tseng SS, Weng JF, Lee TP, Liao AYH, Tsai WN. A rule-based cbr approach for expert finding and problem diagnosis. Expert Systems with Applications 2010; 37(3): 2427-2438.
-
(2010)
Expert Systems with Applications
, vol.37
, Issue.3
, pp. 2427-2438
-
-
Tung, Y.H.1
Tseng, S.S.2
Weng, J.F.3
Lee, T.P.4
Liao, A.Y.H.5
Tsai, W.N.6
-
5
-
-
81855203539
-
-
Automated diagnosis for computer forensics
-
Elsaesser C, Tanner MC. Automated diagnosis for computer forensics, 2001.
-
(2001)
-
-
Elsaesser, C.1
Tanner, M.C.2
-
6
-
-
81855198569
-
-
Intrusion detection, diagnosis, and recovery with self-securing storage. School of Computer Science Carnegie Mellon University, PA
-
Strunk JD, Goodson GR, Pennington AG, Soules CAN, Ganger GR. Intrusion detection, diagnosis, and recovery with self-securing storage. School of Computer Science Carnegie Mellon University, PA, 2002; 15213.
-
(2002)
, pp. 15213
-
-
Strunk, J.D.1
Goodson, G.R.2
Pennington, A.G.3
Soules, C.A.N.4
Ganger, G.R.5
-
7
-
-
84964528090
-
-
Plan recognition in intrusion detection systems. In DARPA Information Survivability Conference and Exposition.
-
Geib CW, Goldman RP. Plan recognition in intrusion detection systems. In DARPA Information Survivability Conference and Exposition, 2001; pp. 46-55.
-
(2001)
, pp. 46-55
-
-
Geib, C.W.1
Goldman, R.P.2
-
8
-
-
21644485091
-
-
Attack plan recognition and prediction using causal networks. In Proceedings of the 20nd Annual Computer Security Applications Conference.
-
Qin X, Lee W. Attack plan recognition and prediction using causal networks. In Proceedings of the 20nd Annual Computer Security Applications Conference, 2004; pp. 370-379.
-
(2004)
, pp. 370-379
-
-
Qin, X.1
Lee, W.2
-
9
-
-
39049104457
-
-
Practical attack graph generation for network defense. In Proceedings of the 22nd Annual Computer Security Applications Conference.
-
Ingols K, Lippmann R, Piwowarski K. Practical attack graph generation for network defense. In Proceedings of the 22nd Annual Computer Security Applications Conference, 2006; pp. 121-130.
-
(2006)
, pp. 121-130
-
-
Ingols, K.1
Lippmann, R.2
Piwowarski, K.3
-
10
-
-
3142632087
-
Techniques and tools for analyzing intrusion alerts
-
Ning P, Cui Y, Reeves DS, Xu D. Techniques and tools for analyzing intrusion alerts. ACM Transactions on Information and System Security 2004; 7(2): 318.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.2
, pp. 318
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
Xu, D.4
-
11
-
-
20444480299
-
-
Managing attack graph complexity through visual hierarchical aggregation. In Proceedings of ACM workshop on Visualization and Data Mining for Computer Security.
-
Noel S, Jajodia S. Managing attack graph complexity through visual hierarchical aggregation. In Proceedings of ACM workshop on Visualization and Data Mining for Computer Security, 2004; pp. 109-118.
-
(2004)
, pp. 109-118
-
-
Noel, S.1
Jajodia, S.2
-
12
-
-
55349101217
-
Optimal ids sensor placement and alert prioritization using attack graphs
-
Noel S, Jajodia S. Optimal ids sensor placement and alert prioritization using attack graphs. Journal of Network and Systems Management 2008; 16(3): 259-275.
-
(2008)
Journal of Network and Systems Management
, vol.16
, Issue.3
, pp. 259-275
-
-
Noel, S.1
Jajodia, S.2
-
13
-
-
34547239511
-
-
A scalable approach to attack graph generation. In Proceedings of the 13th ACM Conference on Computer and Communications Security.
-
Ou X, Boyer WF, Mc Queen MA. A scalable approach to attack graph generation. In Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006; pp. 336-345.
-
(2006)
, pp. 336-345
-
-
Ou, X.1
Boyer, W.F.2
Mc Queen, M.A.3
-
14
-
-
81855198570
-
-
Scenario graphs and attack graphs. PhD Thesis
-
Sheyner OM. Scenario graphs and attack graphs. PhD Thesis, 2004.
-
(2004)
-
-
Sheyner, O.M.1
-
16
-
-
70349687064
-
-
Rule-based anomaly detection on ip flows. In Proceedings of the 28th IEEE International Conference on Computer Communications.
-
Duffield N, Haffner P, Krishnamurthy B, Ringberg H. Rule-based anomaly detection on ip flows. In Proceedings of the 28th IEEE International Conference on Computer Communications, 2009; pp. 424-432.
-
(2009)
, pp. 424-432
-
-
Duffield, N.1
Haffner, P.2
Krishnamurthy, B.3
Ringberg, H.4
-
17
-
-
84874354377
-
-
Fast packet classification for snort by native compilation of rules. In Proceedings of the 22nd Conference on Large Installation System Administration Conference.
-
Tongaonkar A, Vasudevan S, Sekar R. Fast packet classification for snort by native compilation of rules. In Proceedings of the 22nd Conference on Large Installation System Administration Conference, 2008; pp. 159-165.
-
(2008)
, pp. 159-165
-
-
Tongaonkar, A.1
Vasudevan, S.2
Sekar, R.3
-
18
-
-
26844469668
-
Rule weight specification in fuzzy rule-based classification systems
-
Ishibuchi H, Yamamoto T. Rule weight specification in fuzzy rule-based classification systems. IEEE Transactions on Fuzzy Systems 2005; 13(4): 428-435.
-
(2005)
IEEE Transactions on Fuzzy Systems
, vol.13
, Issue.4
, pp. 428-435
-
-
Ishibuchi, H.1
Yamamoto, T.2
-
19
-
-
33846238469
-
A weighting function for improving fuzzy classification systems performance
-
Mansoori EG, Zolghadri MJ, Katebi SD. A weighting function for improving fuzzy classification systems performance. Fuzzy Sets and Systems 2007; 158(5): 583-591.
-
(2007)
Fuzzy Sets and Systems
, vol.158
, Issue.5
, pp. 583-591
-
-
Mansoori, E.G.1
Zolghadri, M.J.2
Katebi, S.D.3
-
23
-
-
0004158119
-
-
Addison-Wesley Longman Publishing Co., Inc.: Boston, MA, USA
-
Jackson P. Introduction to Expert Systems. Addison-Wesley Longman Publishing Co., Inc.: Boston, MA, USA, 1998.
-
(1998)
Introduction to Expert Systems
-
-
Jackson, P.1
-
24
-
-
84947615593
-
-
CVSS. Common vulnerability scoring system.
-
CVSS. Common vulnerability scoring system.
-
-
-
-
25
-
-
50249085983
-
An attack graph-based probabilistic security metric
-
Wang L, Islam T, Long T, Singhal A, Jajodia S. An attack graph-based probabilistic security metric. Data and Applications Security XXII, 2008; pp. 283-296.
-
(2008)
Data and Applications Security XXII
, pp. 283-296
-
-
Wang, L.1
Islam, T.2
Long, T.3
Singhal, A.4
Jajodia, S.5
-
26
-
-
33846269000
-
-
A host-based approach to network attack chaining analysis. In Proceedings of the 21th Annual Computer Security Applications Conference.
-
Ammann P, Pamula J, Ritchey R, Street J. A host-based approach to network attack chaining analysis. In Proceedings of the 21th Annual Computer Security Applications Conference, 2005; pp. 72-84.
-
(2005)
, pp. 72-84
-
-
Ammann, P.1
Pamula, J.2
Ritchey, R.3
Street, J.4
-
27
-
-
60649119575
-
-
Host-centric model checking for network vulnerability analysis. In Proceedings of the 24th Annual Computer Security Applications Conference.
-
Hewett R, Kijsanayothin P. Host-centric model checking for network vulnerability analysis. In Proceedings of the 24th Annual Computer Security Applications Conference, 2008; pp. 225-234.
-
(2008)
, pp. 225-234
-
-
Hewett, R.1
Kijsanayothin, P.2
-
28
-
-
77950797703
-
-
An empirical approach to modeling uncertainty inintrusion analysis. In Proceedings of the 25th Annual Computer Security Applications Conference.
-
Ou X, Rajagopalan SR, Sakthivelmurugan S. An empirical approach to modeling uncertainty inintrusion analysis. In Proceedings of the 25th Annual Computer Security Applications Conference, 2009; pp. 494-503.
-
(2009)
, pp. 494-503
-
-
Ou, X.1
Rajagopalan, S.R.2
Sakthivelmurugan, S.3
-
29
-
-
77950788192
-
-
Evaluating network security with two-layer attack graphs. In Proceedings of the 25th Annual Computer Security Applications Conference.
-
Xie AM, Cai Z, Tang C, Hu J, Chen Z. Evaluating network security with two-layer attack graphs. In Proceedings of the 25th Annual Computer Security Applications Conference, 2009; pp. 127-136.
-
(2009)
, pp. 127-136
-
-
Xie, A.M.1
Cai, Z.2
Tang, C.3
Hu, J.4
Chen, Z.5
-
30
-
-
0038687692
-
-
Scalable, graph-based network vulnerability analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security.
-
Ammann P, Wijesekera D, Kaushik S. Scalable, graph-based network vulnerability analysis. In Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002; pp. 217-224.
-
(2002)
, pp. 217-224
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
31
-
-
84988504967
-
-
A graph-based system for network-vulnerability analysis. In Proceedings of the 1998 workshop on New security paradigms.
-
Phillips C, Swiler LP. A graph-based system for network-vulnerability analysis. In Proceedings of the 1998 workshop on New security paradigms, 1998; pp. 71-79.
-
(1998)
, pp. 71-79
-
-
Phillips, C.1
Swiler, L.P.2
-
32
-
-
57049131581
-
-
Identifying critical attack assets in dependency attack graphs. In Proceedings of the 13th European Symposium on Research in Computer Security.
-
Sawilla R, Ou X. Identifying critical attack assets in dependency attack graphs. In Proceedings of the 13th European Symposium on Research in Computer Security, 2008; pp. 18-34.
-
(2008)
, pp. 18-34
-
-
Sawilla, R.1
Ou, X.2
-
33
-
-
85116520518
-
Topological vulnerability analysis: a powerful new approach for network attack prevention, detection, and response.
-
Statistical Science and Interdisciplinary Research.
-
Jajodia S, Noel S. Topological vulnerability analysis: a powerful new approach for network attack prevention, detection, and response. Algorithms, Architectures and Information Systems Security, Statistical Science and Interdisciplinary Research - Vol. 3, 2009; 285-305.
-
(2009)
Algorithms, Architectures and Information Systems Security
, vol.3
, pp. 285-305
-
-
Jajodia, S.1
Noel, S.2
-
34
-
-
84947618692
-
-
Snort. An open source network intrusion system.
-
Snort. An open source network intrusion system.
-
-
-
-
35
-
-
77949610100
-
-
Belief learning in certainty factor model and its application to text categorization. In Proceedings of the 2003 Joint Conference of the 4th International Conference on Information, Communications and Signal Processing, 2003 and the 4th Pacific Rim Conference on Multimedia.
-
Qu W, Shirai K. Belief learning in certainty factor model and its application to text categorization. In Proceedings of the 2003 Joint Conference of the 4th International Conference on Information, Communications and Signal Processing, 2003 and the 4th Pacific Rim Conference on Multimedia, 2003; volume 2, pp. 1192-1196.
-
(2003)
, vol.2
, pp. 1192-1196
-
-
Qu, W.1
Shirai, K.2
-
36
-
-
81855208244
-
-
DAPRA. Dapra intrusion detection evaluation datasets.
-
DAPRA. Dapra intrusion detection evaluation datasets 2000.
-
(2000)
-
-
-
37
-
-
51849167357
-
-
Alert prioritization in intrusion detection systems. In IEEE Network Operations and Management Symposium.
-
Alsubhi K, Al-Shaer E, Boutaba R. Alert prioritization in intrusion detection systems. In IEEE Network Operations and Management Symposium, 2008; pp. 33-40.
-
(2008)
, pp. 33-40
-
-
Alsubhi, K.1
Al-Shaer, E.2
Boutaba, R.3
-
38
-
-
77955041904
-
-
An online adaptive approach to alert correlation. In Proceedings of the 7th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment.
-
Ren H, Stakhanova N, Ghorbani A. An online adaptive approach to alert correlation. In Proceedings of the 7th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 2010; pp. 153-172.
-
(2010)
, pp. 153-172
-
-
Ren, H.1
Stakhanova, N.2
Ghorbani, A.3
-
39
-
-
33747198726
-
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
-
Wang L, Liu A, Jajodia S. Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. Computer Communications, 2006; 29(15): 2917-2933.
-
(2006)
Computer Communications
, vol.29
, Issue.15
, pp. 2917-2933
-
-
Wang, L.1
Liu, A.2
Jajodia, S.3
-
40
-
-
84947614002
-
-
Tcpdump File Replay Utility. Netpoke.
-
Tcpdump File Replay Utility. Netpoke.
-
-
-
|