메뉴 건너뛰기




Volumn , Issue , 2010, Pages 175-205

Toward automated intrusion alert analysis

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84860670029     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-0-387-73821-5_8     Document Type: Chapter
Times cited : (5)

References (39)
  • 4
    • 0003907293 scopus 로고    scopus 로고
    • Macmillan Technology Publishing, Indianapolis
    • R. G. Bace. Intrusion Detection. Macmillan Technology Publishing, Indianapolis, 2000.
    • (2000) Intrusion Detection
    • Bace, R.G.1
  • 9
    • 84947561772 scopus 로고    scopus 로고
    • Aggregation and correlation of intrusion-detection alerts
    • LNCS
    • H. Debar and A. Wespi. Aggregation and correlation of intrusion-detection alerts. In Recent Advances in Intrusion Detection, LNCS 2212, pages 85-103, 2001.
    • (2001) Recent Advances in Intrusion Detection , vol.2212 , pp. 85-103
    • Debar, H.1    Wespi, A.2
  • 10
    • 35248841190 scopus 로고    scopus 로고
    • July, Archive accessible at http://wi2600.org/mediawhore/mirrors/shmoo/
    • DEFCON. Def con capture the flag (CTF) contest. http://www.defcon.org/ html/defcon-8-post.html, July 2000. Archive accessible at http://wi2600.org/ mediawhore/mirrors/shmoo/.
    • (2000) Def Con Capture the Flag (CTF) Contest
  • 11
    • 0036090387 scopus 로고    scopus 로고
    • STATL: An attack language for state-based intrusion detection
    • S. T. Eckmann, G. Vigna, and R. A. Kemmerer. STATL: An Attack Language for State-based Intrusion Detection. Journal of Computer Security, 10(1/2):71-104, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 71-104
    • Eckmann, S.T.1    Vigna, G.2    Kemmerer, R.A.3
  • 15
    • 0024880562 scopus 로고
    • Similarity coefficients: Measures of cooccurence and association or simply measures of occurrence?
    • March
    • D. A. Jackson, K. M. Somers, and H. H. Harvey. Similarity coefficients: Measures of cooccurence and association or simply measures of occurrence? The American Naturalist, 133(3):436-453, March 1989.
    • (1989) The American Naturalist , vol.133 , Issue.3 , pp. 436-453
    • Jackson, D.A.1    Somers, K.M.2    Harvey, H.H.3
  • 21
    • 0031640906 scopus 로고    scopus 로고
    • Abstraction-based misuse detection: High-level specifications and adaptable strategies
    • Rockport, MA, June
    • J. Lin, X. S. Wang, and S. Jajodia. Abstraction-based misuse detection: High-level specifications and adaptable strategies. In Proceedings of the 11th Computer Security Foundations Workshop, pages 190-201, Rockport, MA, June 1998.
    • (1998) Proceedings of the 11th Computer Security Foundations Workshop , pp. 190-201
    • Lin, J.1    Wang, X.S.2    Jajodia, S.3
  • 30
    • 84891998613 scopus 로고    scopus 로고
    • Accessed on April 30, 2003
    • Packet storm. http://packetstormsecurity.nl. Accessed on April 30, 2003.
  • 33
    • 0036093547 scopus 로고    scopus 로고
    • Model-based analysis of configuration vulnerabilities
    • C. R. Ramakrishnan and R. Sekar. Model-based analysis of configuration vulnerabilities. Journal of Computer Security, 10(1/2):189-209, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 189-209
    • Ramakrishnan, C.R.1    Sekar, R.2
  • 39
    • 0002067431 scopus 로고    scopus 로고
    • NetSTAT: A network-based intrusion detection system
    • G. Vigna and R. A. Kemmerer. NetSTAT: A network-based intrusion detection system. Journal of Computer Security, 7(1):37-71, 1999.
    • (1999) Journal of Computer Security , vol.7 , Issue.1 , pp. 37-71
    • Vigna, G.1    Kemmerer, R.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.