메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Semantic-based context-aware alert fusion for distributed Intrusion Detection Systems

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; DATA DESCRIPTION; SECURITY OF DATA; SEMANTICS;

EID: 84899419846     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CRiSIS.2013.6766352     Document Type: Conference Paper
Times cited : (23)

References (26)
  • 2
    • 2442505788 scopus 로고    scopus 로고
    • Towards multisensor data fusion for dos detection, acm symp
    • C. Siaterlis and B. Maglaris. Towards multisensor data fusion for DoS detection, ACM Symp. on Applied computing. ACM, pp. 439-446, 2004.
    • (2004) On Applied Computing. ACM , pp. 439-446
    • Siaterlis, C.1    Maglaris, B.2
  • 3
    • 60349101742 scopus 로고    scopus 로고
    • Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems
    • R. Perdisci, G. Gu, and W. Lee, Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems, IEEE Int. Conf. on Data Mining (ICDM'06), 2006.
    • (2006) IEEE Int. Conf. on Data Mining (ICDM'06
    • Perdisci, R.1    Gu, G.2    Lee, W.3
  • 5
    • 84899416264 scopus 로고    scopus 로고
    • The behavior knowledge space fusion method:Analysis of generalization error and strategies for performance improvement
    • S. Raudys, and F. Roli, The behavior knowledge space fusion method: Analysis of generalization error and strategies for performance improvement, Multiple Classifier Systems, pp. 160-160, 2003.
    • (2003) Multiple Classifier Systems , pp. 160-160
    • Raudys, S.1    Roli, F.2
  • 7
    • 39749091030 scopus 로고    scopus 로고
    • Intrusion detection engine on dempster-shafer's theory of evidence
    • W. Hu, J. Li, and Q. Gao, Intrusion Detection Engine on Dempster-Shafer's Theory of Evidence, Int. Conf. on Communications, Circuits and Systems, Vol. 3, pp. 1627-1631, 2006.
    • (2006) Int. Conf. on Communications, Circuits and Systems , vol.3 , pp. 1627-1631
    • Hu, W.1    Li, J.2    Gao, Q.3
  • 10
    • 38149027709 scopus 로고    scopus 로고
    • Alert correlation for extracting attack strategies
    • B. Zhu, and A.A. Ghorbani, Alert correlation for extracting attack strategies, Int. J. of Network Security, Vol. 3, No. 3, pp. 244-258, 2006.
    • (2006) Int. J. of Network Security , vol.3 , Issue.3 , pp. 244-258
    • Zhu, B.1    Ghorbani, A.A.2
  • 20
    • 77957282880 scopus 로고    scopus 로고
    • Datamastera plug-in for importing schemas and data from relational databases into protégé
    • C. Nyulas, M. O'Connor, and S. Tu, Datamastera plug-in for importing schemas and data from relational databases into protege., 10th Int. Prot́eǵe Conf., 2007.
    • (2007) 10th Int. Prot́eǵe Conf.
    • Nyulas, C.1    O'connor, M.2    Tu, S.3
  • 24
    • 84899459373 scopus 로고    scopus 로고
    • MIT Lincoln Laboratory, 2000 DARPA intrusion detection scenario specific data sets, 2000
    • MIT Lincoln Laboratory, 2000 DARPA intrusion detection scenario specific data sets, 2000.
  • 25
    • 84892710333 scopus 로고    scopus 로고
    • A survey of defense mechanisms against distributed denial of service (ddos) flooding attacks
    • S. T. Zargar, J. Joshi, and D. Tipper, A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks, IEEE Communications Surveys &Tutorials, vol.PP, no.99, pp. 1-24.
    • IEEE Communications Surveys &Tutorials , Issue.99 , pp. 1-24
    • Zargar, S.T.1    Joshi, J.2    Tipper, D.3
  • 26
    • 84899435979 scopus 로고    scopus 로고
    • North Carolina State University Cyber Defense Laboratory, Tiaa: A toolkit for intrusion alert analysis, [online
    • North Carolina State University Cyber Defense Laboratory, Tiaa: A toolkit for intrusion alert analysis, [online] http://discovery.csc.ncsu.edu/software/ correlator/ver0.4/index.html.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.