-
1
-
-
84860495162
-
Modeling multistep cyber attacks for scenario recognition
-
Cheung, S., Lindqvist, U. and Fong, M. (2003) 'Modeling multistep cyber attacks for scenario recognition', in DARPA Information Survivability Conference and Exposition, Vol. 1, pp.284-292.
-
(2003)
DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 284-292
-
-
Cheung, S.1
Lindqvist, U.2
Fong, M.3
-
3
-
-
84944201343
-
Lambda: A language to model a database for detection of attacks
-
Springer Berlin/Heidelberg
-
Cuppens, F. and Ortalo, R. (2000) 'Lambda: a language to model a database for detection of attacks', in Recent Advances in Intrusion Detection, Lecture Notes in Computer Science, Springer Berlin/Heidelberg, Vol. 1907, pp.197-216.
-
(2000)
Recent Advances in Intrusion Detection, Lecture Notes in Computer Science
, vol.1907
, pp. 197-216
-
-
Cuppens, F.1
Ortalo, R.2
-
5
-
-
0037856497
-
The clonal selection algorithm with engineering applications
-
De Castro, L. and Von Zuben, F. (2000) 'The clonal selection algorithm with engineering applications', in GECCO 2000, pp.36-39.
-
(2000)
GECCO 2000
, pp. 36-39
-
-
De Castro, L.1
Von Zuben, F.2
-
6
-
-
0036090387
-
STATL: An attack language for state-based intrusion detection
-
Eckmann, ST., Vigna, G. and Kemmerer, RA. (2002) 'Statl: an attack language for state-based intrusion detection', J. Comput. Secur., Vol. 10, Nos. 1-2, pp.71-103. (Pubitemid 34531413)
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 71-103
-
-
Eckmann, S.T.1
Vigna, G.2
Kemmerer, R.A.3
-
7
-
-
0027961889
-
Self-nonself discrimination in a computer
-
Forrest, S., Perelson, A., Allen, L. and Cherukuri, R. (1994) 'Self-nonself discrimination in a computer' in Research in Security and Privacy, Proceedings, 1994 IEEE Computer Society Symposium, pp.202-212.
-
(1994)
Research in Security and Privacy, Proceedings, 1994 IEEE Computer Society Symposium
, pp. 202-212
-
-
Forrest, S.1
Perelson, A.2
Allen, L.3
Cherukuri, R.4
-
8
-
-
79960352377
-
-
Springer, New York
-
Ghorbani, A., Lu, W. and Tavallaee, M. (2010) Network Intrusion Detection and Prevention, Springer, New York.
-
(2010)
Network Intrusion Detection and Prevention
-
-
Ghorbani, A.1
Lu, W.2
Tavallaee, M.3
-
9
-
-
26944469543
-
Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection
-
Artificial Immune Systems: 4th International Conference, ICARIS 2005. Proceedings
-
Greensmith, J., Aickelin, U. and Cayzer, S. (2005) 'Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection', in Artificial Immune Systems, Lecture Notes in Computer Science, Springer Berlin/Heidelberg, Vol. 3627, pp.153-167. (Pubitemid 41472720)
-
(2005)
Lecture Notes in Computer Science
, vol.3627
, pp. 153-167
-
-
Greensmith, J.1
Aickelin, U.2
Cayzer, S.3
-
11
-
-
84862178933
-
-
netForensics Honeynet team (accessed on 1 April 2012)
-
netForensics Honeynet team (2005) 'Honeynet traffic logs', available at http://old.honeynet.org/scans/scan34 (accessed on 1 April 2012).
-
(2005)
Honeynet Traffic Logs
-
-
-
12
-
-
0003732734
-
-
Garland Science Publishing, New York
-
Janeway, C., Travers, P., Walport, M. and Shlomchik, M. (2008) Immunobiology: The Immune System in Health and Disease, Garland Science Publishing, New York.
-
(2008)
Immunobiology: The Immune System in Health and Disease
-
-
Janeway, C.1
Travers, P.2
Walport, M.3
Shlomchik, M.4
-
13
-
-
3142623031
-
Clustering intrusion detection alarms to support root cause analysis
-
Julisch, K. (2003) 'Clustering intrusion detection alarms to support root cause analysis', ACM Trans. Inform. Syst. Secur, Vol. 6, pp.443-471.
-
(2003)
ACM Trans. Inform. Syst. Secur
, vol.6
, pp. 443-471
-
-
Julisch, K.1
-
15
-
-
66449085932
-
Reducing false positives in anomaly detectors through fuzzy alert aggregation
-
Maggia, F., Matteucci, M. and Zanero, S. (2009) 'Reducing false positives in anomaly detectors through fuzzy alert aggregation', Inform. Fusion, Vol. 10, No. 4, pp.300-311.
-
(2009)
Inform. Fusion
, vol.10
, Issue.4
, pp. 300-311
-
-
Maggia, F.1
Matteucci, M.2
Zanero, S.3
-
16
-
-
0034301662
-
A data mining analysis of RTID alarms
-
Manganaris, S., Christensen, M., Zerkle, D. and Hermiz, K. (2000) 'A data mining analysis of RTID alarms', Comput Network, Vol. 34, No. 4, pp.571-577.
-
(2000)
Comput Network
, vol.34
, Issue.4
, pp. 571-577
-
-
Manganaris, S.1
Christensen, M.2
Zerkle, D.3
Hermiz, K.4
-
17
-
-
77956988169
-
M2d2: A formal data model for ids alert correlation
-
Springer-Verlag, Berlin, Heidelberg, RAID '02
-
Morin, B., Me, L., Debar, H. and Ducasse, M. (2002) 'M2d2: a formal data model for ids alert correlation' in Proceedings of the 5th International Conference on Recent Advances in Intrusion Detection, Springer-Verlag, Berlin, Heidelberg, RAID '02, pp.115-137.
-
(2002)
Proceedings of the 5th International Conference on Recent Advances in Intrusion Detection
, pp. 115-137
-
-
Morin, B.1
Me, L.2
Debar, H.3
Ducasse, M.4
-
18
-
-
67349242974
-
A logic-based model to support alert correlation in intrusion detection
-
Morin, B., Me, L., Debar, H. and Ducass, M. (2009) 'A logic-based model to support alert correlation in intrusion detection', Inform. Fusion, Special Issue on Information Fusion in Computer Security, Vol. 10, No. 4, pp.285-299.
-
(2009)
Inform. Fusion, Special Issue on Information Fusion in Computer Security
, vol.10
, Issue.4
, pp. 285-299
-
-
Morin, B.1
Me, L.2
Debar, H.3
Ducass, M.4
-
19
-
-
84862221978
-
-
NCSUCD Lab (accessed on 1 April 2012)
-
NCSUCD Lab (2004) 'Tiaa: a toolkit for intrusion alert analysis', available at http://discovery.csc.ncsu.edu/software/correlator/ver0.4/index.html (accessed on 1 April 2012).
-
(2004)
Tiaa: A Toolkit for Intrusion Alert Analysis
-
-
-
20
-
-
0038011185
-
Constructing attack scenarios through correlation of intrusion alerts
-
Ning, P., Cui, Y. and Reeves, DS. (2002) 'Constructing attack scenarios through correlation of intrusion alerts' in Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS '02, pp.245-254.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS '02
, pp. 245-254
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
22
-
-
84958955499
-
A mission-impact-based approach to infosec alarm correlation
-
Springer-Verlag, Berlin, Heidelberg, RAID '02
-
Porras, PA., Fong, MW. and Valdes, A. (2002) 'A mission-impact-based approach to infosec alarm correlation' in Proceedings of the 5th International Conference on Recent Advances in Intrusion Detection, Springer-Verlag, Berlin, Heidelberg, RAID '02, pp 95-114.
-
(2002)
Proceedings of the 5th International Conference on Recent Advances in Intrusion Detection
, pp. 95-114
-
-
Porras, P.A.1
Fong, M.W.2
Valdes, A.3
-
24
-
-
77955041904
-
An online adaptive approach to alert correlation
-
Springer Berlin/Heidelberg
-
Ren, H., Stakhanova, N. and Ghorbani, A. (2010) 'An online adaptive approach to alert correlation', in Detection of Intrusions and Malware, and Vulnerability Assessment, Lecture Notes in Computer Science, Springer Berlin/Heidelberg, Vol. 6201, pp.153-172.
-
(2010)
Detection of Intrusions and Malware, and Vulnerability Assessment, Lecture Notes in Computer Science
, vol.6201
, pp. 153-172
-
-
Ren, H.1
Stakhanova, N.2
Ghorbani, A.3
-
25
-
-
63049125148
-
An incremental frequent structure mining framework for real-time alert correlation
-
Sadoddin, R. and Ghorbani, A. (2009) 'An incremental frequent structure mining framework for real-time alert correlation', Comput. Secur, Vol. 28, Nos. 3-4, pp.153-173.
-
(2009)
Comput. Secur
, vol.28
, Issue.3-4
, pp. 153-173
-
-
Sadoddin, R.1
Ghorbani, A.2
-
27
-
-
84862190056
-
A language driven intrusion detection system for event and alert correlation
-
Springer Boston
-
Totel, E. and Vivinis, B. (2004) 'A language driven intrusion detection system for event and alert correlation', in Security and Protection in Information Processing Systems, IFIP International Federation for Information Processing, Springer Boston, Vol. 147, pp.208-224.
-
(2004)
Security and Protection in Information Processing Systems, IFIP International Federation for Information Processing
, vol.147
, pp. 208-224
-
-
Totel, E.1
Vivinis, B.2
-
29
-
-
84947603083
-
Probabilistic alert correlation
-
Recent Advances in Intrusion Detection
-
Valdes, A. and Skinner, K. (2001) 'Probabilistic alert correlation', in Recent Advances in Intrusion Detection, Vol. 2212, pp.54-68. (Pubitemid 33352000)
-
(2001)
Lecture Notes in Computer Science
, Issue.2212
, pp. 54-68
-
-
Valdes, A.1
Skinner, K.2
-
30
-
-
21944457574
-
A comprehensive approach to intrusion detection alert correlation
-
Valeur, F., Vigna, G., Kruegel, C. and Kemmerer, R. (2004) 'A comprehensive approach to intrusion detection alert correlation', IEEE Transactions on Dependable and Secure Computing, Vol. 1, pp.146-169.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, pp. 146-169
-
-
Valeur, F.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.4
-
31
-
-
67349164787
-
Processing intrusion detection alert aggregates with time series modeling
-
Inform Fusion DOI 10.1016/j.inffus.2009.01.003
-
Viinikka, J., Debar, H., Lehikoinen, A. and Tarvainen, M. (2009) 'Processing intrusion detection alert aggregates with time series modeling', Inform Fusion DOI 10.1016/j.inffus.2009.01.003, Special Issue on Information Fusion in Computer Security, Vol. 10, No. 4, pp.312-324.
-
(2009)
Special Issue on Information Fusion in Computer Security
, vol.10
, Issue.4
, pp. 312-324
-
-
Viinikka, J.1
Debar, H.2
Lehikoinen, A.3
Tarvainen, M.4
-
32
-
-
79959289473
-
Automatic multi-step attack pattern discovering
-
Wang, L., Ghorbani, A. and Li, Y. (2010) 'Automatic multi-step attack pattern discovering', Int. J. Netw. Secur, Vol. 10, No. 2, pp.142-152.
-
(2010)
Int. J. Netw. Secur
, vol.10
, Issue.2
, pp. 142-152
-
-
Wang, L.1
Ghorbani, A.2
Li, Y.3
-
33
-
-
3543121725
-
Artificial immune recognition system (airs): An immune-inspired supervised learning algorithm
-
Watkins, A., Timmis, J. and Boggess, L. (2004) 'Artificial immune recognition system (airs): an immune-inspired supervised learning algorithm', Genetic Programming and Evolvable Machines, Vol. 5, No. 3, pp.291-317.
-
(2004)
Genetic Programming and Evolvable Machines
, vol.5
, Issue.3
, pp. 291-317
-
-
Watkins, A.1
Timmis, J.2
Boggess, L.3
-
35
-
-
38149027709
-
Alert correlation for extracting attack strategies
-
Zhu, B. and Ghorbani, A. (2006) 'Alert correlation for extracting attack strategies', Int. J. Netw. Secur, Vol. 3, No. 3, pp.244-258.
-
(2006)
Int. J. Netw. Secur
, vol.3
, Issue.3
, pp. 244-258
-
-
Zhu, B.1
Ghorbani, A.2
|