메뉴 건너뛰기




Volumn 45 LNICST, Issue , 2010, Pages 203-215

A correlation approach to intrusion detection

Author keywords

Correlation; Detection; Fusion

Indexed keywords

ARCHITECTURAL LEVELS; ATTACK SCENARIOS; DISTRIBUTED SECURITY; EVENT CORRELATION; INTRUSION DETECTION SYSTEMS;

EID: 84863939166     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-16644-0_19     Document Type: Conference Paper
Times cited : (5)

References (20)
  • 1
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • Axelsson, S.: The base-rate fallacy and the difficulty of intrusion detection. ACM Trans. on Information and System Security 3(3), 186-205 (2000)
    • (2000) ACM Trans. on Information and System Security , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 4
    • 0037002475 scopus 로고    scopus 로고
    • Intrusion detection: A brief history and overview
    • Kemmerer, R., Vigna, G.: Intrusion detection: a brief history and overview. IEEE Computer 35(4), 27-30 (2002)
    • (2002) IEEE Computer , vol.35 , Issue.4 , pp. 27-30
    • Kemmerer, R.1    Vigna, G.2
  • 5
    • 48249102627 scopus 로고    scopus 로고
    • Anomaly detection with diagnosis in diversified systems using information flow graphs
    • IFIP International Federation for Information Processing. Springer, Boston
    • Majorczyk, F., Totel, E., Mé, L.: Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs. In: IFIP International Federation for Information Processing. LNCS, vol. 278, pp. 301-315. Springer, Boston (2008)
    • (2008) LNCS , vol.278 , pp. 301-315
    • Majorczyk, F.1    Totel, E.2    Mé, L.3
  • 7
    • 3142623031 scopus 로고    scopus 로고
    • Clustering intrusion detection alarms to support root cause analysis
    • Julisch, K.: Clustering intrusion detection alarms to support root cause analysis. ACM Trans. on Information and System Security 6(4), 443-471 (2003)
    • (2003) ACM Trans. on Information and System Security , vol.6 , Issue.4 , pp. 443-471
    • Julisch, K.1
  • 8
    • 77953769194 scopus 로고    scopus 로고
    • Alert confidence fusion in intrusion detection systems with extended dempster-shafer theory
    • May
    • Yu, D., Frincke, D.: Alert Confidence Fusion in Intrusion Detection Systems with Extended Dempster-Shafer Theory. In: Proc. of the 43rd ACM Southeast Regional Conference, vol. 2, pp. 142-147 (May 2005)
    • (2005) Proc. of the 43rd ACM Southeast Regional Conference , vol.2 , pp. 142-147
    • Yu, D.1    Frincke, D.2
  • 9
    • 33646160004 scopus 로고    scopus 로고
    • Correlation of intrusion symptoms: An application of chronicles
    • Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. Springer, Heidelberg
    • Morin, B., Debar, H.: Correlation of intrusion symptoms: An application of chronicles. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 94-112. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2820 , pp. 94-112
    • Morin, B.1    Debar, H.2
  • 10
    • 84885884096 scopus 로고    scopus 로고
    • December
    • The OWASP Top 10 Web attacks (December 2009), http://www.owasp.org/index. php/Category:OWASP-Top-Ten-Project
    • (2009) The OWASP Top 10 Web Attacks
  • 16
    • 84885893912 scopus 로고    scopus 로고
    • last update September
    • Scalp: Apache log analyzer, http://code.google.com/p/apache-scalp/ (last update September 2009)
    • (2009) Scalp: Apache Log Analyzer
  • 18
    • 84885888837 scopus 로고    scopus 로고
    • last access October 2009
    • Coral8 Engine, at http://www.aleri.com/sites/default/files/assets/ product-literature/Coral8%20Engine.pdf (last access October 2009)
  • 19
    • 84885890672 scopus 로고    scopus 로고
    • last access December 2009
    • Oracle CEP, http://www.watersonline.com/public/showPage.html?page=800767 (last access December 2009)
  • 20
    • 84885887640 scopus 로고    scopus 로고
    • last access February 2010
    • The Borealis project, http://www.cs.brown.edu/research/borealis/public/ (last access February 2010)
    • The Borealis Project


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.