메뉴 건너뛰기




Volumn 1, Issue , 2003, Pages 284-292

Modeling multistep cyber attacks for scenario recognition

Author keywords

Engines; Libraries; Prototypes; Security; Vocabulary

Indexed keywords

COMPUTATIONAL LINGUISTICS; COMPUTER CRIME; CRIME; ENGINES; LIBRARIES;

EID: 84860495162     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DISCEX.2003.1194892     Document Type: Conference Paper
Times cited : (205)

References (28)
  • 1
    • 0020849266 scopus 로고
    • Maintaining knowledge about temporal intervals
    • J. F. Allen. Maintaining knowledge about temporal intervals. Communications of the ACM, 26(11):832-843, 1983.
    • (1983) Communications of the ACM , vol.26 , Issue.11 , pp. 832-843
    • Allen, J.F.1
  • 7
    • 84944201343 scopus 로고    scopus 로고
    • LAMBDA: A language to model a database for detection of attacks
    • H. Debar, L. Mé, and S. F. Wu, editors, Recent Advances in Intrusion Detection (RAID 2000), Toulouse, France, Oct. 2-4, Springer-Verlag
    • F. Cuppens and R. Ortalo. LAMBDA: A language to model a database for detection of attacks. In H. Debar, L. Mé, and S. F. Wu, editors, Recent Advances in Intrusion Detection (RAID 2000), volume 1907 of LNCS, pages 197-216, Toulouse, France, Oct. 2-4, 2000. Springer-Verlag.
    • (2000) LNCS , vol.1907 , pp. 197-216
    • Cuppens, F.1    Ortalo, R.2
  • 9
    • 84947561772 scopus 로고    scopus 로고
    • Aggregation and correlation of intrusion-detection alerts
    • W. Lee, L. Mé, and A. Wespi, editors, Recent Advances in Intrusion Detection (RAID 2001), Davis, California, Oct. 10-12, Springer-Verlag
    • H. Debar and A. Wespi. Aggregation and correlation of intrusion-detection alerts. In W. Lee, L. Mé, and A. Wespi, editors, Recent Advances in Intrusion Detection (RAID 2001), volume 2212 of LNCS, pages 85-103, Davis, California, Oct. 10-12, 2001. Springer-Verlag.
    • (2001) LNCS , vol.2212 , pp. 85-103
    • Debar, H.1    Wespi, A.2
  • 10
    • 0036090387 scopus 로고    scopus 로고
    • STATL: An attack language for state-based intrusion detection
    • S. T. Eckmann, G. Vigna, and R. A, Kemmerer. STATL: An attack language for state-based intrusion detection. Journal of Computer Security, 10:71-103, 2002.
    • (2002) Journal of Computer Security , vol.10 , pp. 71-103
    • Eckmann, S.T.1    Vigna, G.2    Kemmerer, R.A.3
  • 15
    • 84940110274 scopus 로고    scopus 로고
    • Detecting computer and network misuse through the production-based expert system toolset (P-BEST)
    • Oakland, California, May 9-12
    • U. Lindqvist and P. A. Porras. Detecting computer and network misuse through the production-based expert system toolset (P-BEST). In Proceedings of the 1999 IEEE Symposium on Security and Privacy, pages 146-161, Oakland, California, May 9-12, 1999.
    • (1999) Proceedings of the 1999 IEEE Symposium on Security and Privacy , pp. 146-161
    • Lindqvist, U.1    Porras, P.A.2
  • 19
    • 84958955499 scopus 로고    scopus 로고
    • A mission-impact-based approach to INFOSEC alarm correlation
    • A. Wespi, G. Vigna, and L. Deri, editors, Recent Advances in Intrusion Detection (RAID 2002), Zurich, Switzerland, Oct. 16-18
    • P. A. Porras, M. W. Fong, and A. Valdes. A mission-impact-based approach to INFOSEC alarm correlation. In A. Wespi, G. Vigna, and L. Deri, editors, Recent Advances in Intrusion Detection (RAID 2002), volume 2516 of LNCS, pages 95-114, Zurich, Switzerland, Oct. 16-18, 2002.
    • (2002) LNCS , vol.2516 , pp. 95-114
    • Porras, P.A.1    Fong, M.W.2    Valdes, A.3
  • 21
    • 0036093547 scopus 로고    scopus 로고
    • Model-based analysis of configuration vulnerabilities
    • C. R. Ramakrishnan and R. Sekar. Model-based analysis of configuration vulnerabilities. Journal of Computer Security, 10(12):189-209, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 189-209
    • Ramakrishnan, C.R.1    Sekar, R.2
  • 25
    • 0034593179 scopus 로고    scopus 로고
    • A requires/provides model for computer attacks
    • Ballycotton Co., Cork, Ireland, Sept. 18-21
    • S. J. Templeton and K. Levitt. A requires/provides model for computer attacks. In Proceedings of the 2000 New Security Paradigms Workshop, pages 31-38, Ballycotton Co., Cork, Ireland, Sept. 18-21, 2000.
    • (2000) Proceedings of the 2000 New Security Paradigms Workshop , pp. 31-38
    • Templeton, S.J.1    Levitt, K.2
  • 26
    • 84947603083 scopus 로고    scopus 로고
    • Probabilistic alert correlation
    • W. Lee, L. Mé, and A. Wespi, editors, Recent Advances in Intrusion Detection (RAID 2001), Davis, California, Oct. 10-12, Springer-Verlag
    • A. Valdes and K. Skinner. Probabilistic alert correlation. In W. Lee, L. Mé, and A. Wespi, editors, Recent Advances in Intrusion Detection (RAID 2001), volume 2212 of LNCS, pages 54-68, Davis, California, Oct. 10-12, 2001. Springer-Verlag.
    • (2001) LNCS , vol.2212 , pp. 54-68
    • Valdes, A.1    Skinner, K.2
  • 28
    • 85084161252 scopus 로고    scopus 로고
    • NetKuang-a multi-host configuration vulnerability checker
    • San Jose, California, July 22-25
    • D. Zerkle and K. Levitt. NetKuang-a multi-host configuration vulnerability checker. In Proceedings of the Sixth USENIX Security Symposium, pages 195-204, San Jose, California, July 22-25, 1996.
    • (1996) Proceedings of the Sixth USENIX Security Symposium , pp. 195-204
    • Zerkle, D.1    Levitt, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.