-
1
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
Axelsson, S.: The base-rate fallacy and the difficulty of intrusion detection. ACM Trans. on Information and System Security 3(3), 186-205 (2000)
-
(2000)
ACM Trans. on Information and System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
2
-
-
0034301662
-
A data mining analysis of RTID alarms
-
Manganaris, S., Christensen, M., Hermiz, K.: A data mining analysis of RTID alarms. Computer Networks 34(4), 571-577 (2000)
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 571-577
-
-
Manganaris, S.1
Christensen, M.2
Hermiz, K.3
-
4
-
-
0037002475
-
Intrusion detection: A brief history and overview
-
Kemmerer, R., Vigna, G.: Intrusion detection: a brief history and overview. IEEE Computer 35(4), 27-30 (2002)
-
(2002)
IEEE Computer
, vol.35
, Issue.4
, pp. 27-30
-
-
Kemmerer, R.1
Vigna, G.2
-
5
-
-
48249102627
-
Anomaly detection with diagnosis in diversified systems using information flow graphs
-
IFIP International Federation for Information Processing. Springer, Boston
-
Majorczyk, F., Totel, E., Mé, L.: Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs. In: IFIP International Federation for Information Processing. LNCS, vol. 278, pp. 301-315. Springer, Boston (2008)
-
(2008)
LNCS
, vol.278
, pp. 301-315
-
-
Majorczyk, F.1
Totel, E.2
Mé, L.3
-
6
-
-
3142632087
-
Techniques and tools for analyzing intrusion alerts
-
Ning, P., Cui, Y., Xu, D.: Techniques and tools for analyzing intrusion alerts. ACM Trans. on Information and System Security 7(2), 274-318 (2004)
-
(2004)
ACM Trans. on Information and System Security
, vol.7
, Issue.2
, pp. 274-318
-
-
Ning, P.1
Cui, Y.2
Xu, D.3
-
7
-
-
3142623031
-
Clustering intrusion detection alarms to support root cause analysis
-
Julisch, K.: Clustering intrusion detection alarms to support root cause analysis. ACM Trans. on Information and System Security 6(4), 443-471 (2003)
-
(2003)
ACM Trans. on Information and System Security
, vol.6
, Issue.4
, pp. 443-471
-
-
Julisch, K.1
-
8
-
-
77953769194
-
Alert confidence fusion in intrusion detection systems with extended dempster-shafer theory
-
May
-
Yu, D., Frincke, D.: Alert Confidence Fusion in Intrusion Detection Systems with Extended Dempster-Shafer Theory. In: Proc. of the 43rd ACM Southeast Regional Conference, vol. 2, pp. 142-147 (May 2005)
-
(2005)
Proc. of the 43rd ACM Southeast Regional Conference
, vol.2
, pp. 142-147
-
-
Yu, D.1
Frincke, D.2
-
9
-
-
33646160004
-
Correlation of intrusion symptoms: An application of chronicles
-
Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. Springer, Heidelberg
-
Morin, B., Debar, H.: Correlation of intrusion symptoms: An application of chronicles. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 94-112. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2820
, pp. 94-112
-
-
Morin, B.1
Debar, H.2
-
10
-
-
84885884096
-
-
December
-
The OWASP Top 10 Web attacks (December 2009), http://www.owasp.org/index. php/Category:OWASP-Top-Ten-Project
-
(2009)
The OWASP Top 10 Web Attacks
-
-
-
11
-
-
21944457574
-
A comprehensive approach to intrusion detection alert correlation
-
Valeur, F., Vigna, G., Kruegel, C.: A Comprehensive Approach to Intrusion Detection Alert Correlation. IEEE Transactions on Dependable and Secure Computing 1(3), 146-169 (2004)
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.3
, pp. 146-169
-
-
Valeur, F.1
Vigna, G.2
Kruegel, C.3
-
12
-
-
33745650701
-
COTS diversity based intrusion detection and application to web servers
-
DOI 10.1007/11663812-3, Recent Advances in Intrusion Detection - 8th International Symposium, RAID 2005, Revised Papers
-
Totel, E., Majorczyk, F., Mé, L.: COTS Diversity Based Intrusion Detection and Application to Web Servers. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 43-62. Springer, Heidelberg (2006) (Pubitemid 43973721)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3858
, pp. 43-62
-
-
Totel, E.1
Majorczyk, F.2
Me, L.3
-
14
-
-
58149092425
-
Assuring resilient time synchronization
-
IEEE CS Press, Los Alamitos (October
-
Bondavalli, A., Ceccarelli, A., Falai, L.: Assuring Resilient Time Synchronization. In: Proc. of the IEEE Symposium on Reliable Distributed Systems (SRDS 2008), pp. 3-12. IEEE CS Press, Los Alamitos (October 2008 )
-
(2008)
Proc. of the IEEE Symposium on Reliable Distributed Systems (SRDS 2008)
, pp. 3-12
-
-
Bondavalli, A.1
Ceccarelli, A.2
Falai, L.3
-
15
-
-
70350759684
-
A weight-based symptom correlation approach to SQL injection attacks
-
IEEE CS Press, Los Alamitos (September
-
Ficco, M., Coppolino, L., Romano, L.: A Weight-Based Symptom Correlation Approach to SQL Injection Attacks. In: Proc. of the 4th Latin-American Symposium on Dependable Computing (LADC 2009). IEEE CS Press, Los Alamitos (September 2009)
-
(2009)
Proc. of the 4th Latin-American Symposium on Dependable Computing (LADC 2009)
-
-
Ficco, M.1
Coppolino, L.2
Romano, L.3
-
16
-
-
84885893912
-
-
last update September
-
Scalp: Apache log analyzer, http://code.google.com/p/apache-scalp/ (last update September 2009)
-
(2009)
Scalp: Apache Log Analyzer
-
-
-
18
-
-
84885888837
-
-
last access October 2009
-
Coral8 Engine, at http://www.aleri.com/sites/default/files/assets/ product-literature/Coral8%20Engine.pdf (last access October 2009)
-
-
-
-
19
-
-
84885890672
-
-
last access December 2009
-
Oracle CEP, http://www.watersonline.com/public/showPage.html?page=800767 (last access December 2009)
-
-
-
-
20
-
-
84885887640
-
-
last access February 2010
-
The Borealis project, http://www.cs.brown.edu/research/borealis/public/ (last access February 2010)
-
The Borealis Project
-
-
|