-
2
-
-
3142623031
-
Clustering intrusion detection alarms to support root cause analysis
-
ACM Press
-
Julisch K. Clustering intrusion detection alarms to support root cause analysis. ACM Transactions on Information and System Security ACM Press, 2003; 6(4): 443-471.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.4
, pp. 443-471
-
-
Julisch, K.1
-
3
-
-
0034301662
-
-
Elsevier North-Holland, Inc: Amsterdam
-
Manganaris S, Christensen M, Zerkle D, Hermiz K. A Data Mining Analysis of RTID Alarms, Computer Networks, 34(4), Elsevier North-Holland, Inc: Amsterdam, 2000; 571-577.
-
(2000)
A Data Mining Analysis of RTID Alarms, Computer Networks
, vol.34
, Issue.4
, pp. 571-577
-
-
Manganaris, S.1
Christensen, M.2
Zerkle, D.3
Hermiz, K.4
-
4
-
-
35048852163
-
-
A novel framework for alert correlation and understanding, Proc. on ACNS 2004, LNCS 3089
-
Yu D, Frincke D. A novel framework for alert correlation and understanding, Proc. on ACNS 2004, LNCS 3089, 2004; 452-466.
-
(2004)
, pp. 452-466
-
-
Yu, D.1
Frincke, D.2
-
5
-
-
84908184342
-
-
Using alert cluster to reduce IDS alerts, ICCIT2010, IEEE
-
Humphrey WN, Luo J. Using alert cluster to reduce IDS alerts, ICCIT2010, IEEE, 2010; 467-471.
-
(2010)
, pp. 467-471
-
-
Humphrey, W.N.1
Luo, J.2
-
6
-
-
78651574351
-
A novel data mining-based method for alert reduction and analysis
-
Fu X, Shi J, Xie L. A novel data mining-based method for alert reduction and analysis. Journal of Networks 2010; 5(1):88-97.
-
(2010)
Journal of Networks
, vol.5
, Issue.1
, pp. 88-97
-
-
Fu, X.1
Shi, J.2
Xie, L.3
-
7
-
-
26444495635
-
-
IDS false alarm reduction using continuous and discontinuous patterns, Proceedings of ACNS 2005, LNCS
-
Alharby A, Imai H. IDS false alarm reduction using continuous and discontinuous patterns, Proceedings of ACNS 2005, LNCS, 2005; 192-205.
-
(2005)
, pp. 192-205
-
-
Alharby, A.1
Imai, H.2
-
8
-
-
23944484457
-
-
IDS false alarm filtering using KNN classifier, 5th International Workshop, WISA 2004, LNCS
-
Kwok HL, Lam FK. IDS false alarm filtering using KNN classifier, 5th International Workshop, WISA 2004, LNCS, 2004; 114-121.
-
(2004)
, pp. 114-121
-
-
Kwok, H.L.1
Lam, F.K.2
-
9
-
-
26444436687
-
-
Using adaptive alert classification to reduce false positives in intrusion detection, 7th International Symposium RAID 2004, LNCS
-
Pietraszek T. Using adaptive alert classification to reduce false positives in intrusion detection, 7th International Symposium RAID 2004, LNCS, 2004; 102-124.
-
(2004)
, pp. 102-124
-
-
Pietraszek, T.1
-
10
-
-
0347742772
-
Intrusion detection systems and multisensor data fusion
-
In, ACM Press: New York, NY, USA
-
Bass T. Intrusion detection systems and multisensor data fusion. In Communications of the ACM, ACM Press: New York, NY, USA, 2000; 99-105.
-
(2000)
Communications of the ACM
, pp. 99-105
-
-
Bass, T.1
-
11
-
-
26944446508
-
-
Alarm clustering for intrusion detection systems in computer networks, MLDM 2005, LNAI 3587
-
Giacinto G, Perdisci R, Roli F. Alarm clustering for intrusion detection systems in computer networks, MLDM 2005, LNAI 3587, 2005; 184-193.
-
(2005)
, pp. 184-193
-
-
Giacinto, G.1
Perdisci, R.2
Roli, F.3
-
12
-
-
33750327345
-
-
A framework for the application of association rule mining in large intrusion detection infrastructures, RAID 2006, LNCS 4219
-
Treinen JJ, Thurimella R. A framework for the application of association rule mining in large intrusion detection infrastructures, RAID 2006, LNCS 4219, 2006; 1-18.
-
(2006)
, pp. 1-18
-
-
Treinen, J.J.1
Thurimella, R.2
-
13
-
-
0038663185
-
Intrusion detection with unlabeled data using clustering
-
In, ACM: Philadelphia, PA; USA
-
Portnoy L, Eskin E, Stolfo S. Intrusion detection with unlabeled data using clustering, In Proceedings of ACM CSS Workshop on Data Mining Applied to Security, ACM: Philadelphia, PA; USA, 2001.
-
(2001)
Proceedings of ACM CSS Workshop on Data Mining Applied to Security
-
-
Portnoy, L.1
Eskin, E.2
Stolfo, S.3
-
14
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection: intrusion detection in unlabeled data
-
In, Kluwer Academic: Boston
-
Eskin E, Arnold A, Prerau M, Portnoy L, Stolfo S. A geometric framework for unsupervised anomaly detection: intrusion detection in unlabeled data, In Applications of Data Mining in Computer Security, Kluwer Academic: Boston; 2002.
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
15
-
-
0141540496
-
Y-means: a clustering method for intrusion detection
-
In IEEE Canadian Conference on Electrical and Computer Engineering, Proceedings
-
Guan Y, Ghorbani A, Belacel N. Y-means: a clustering method for intrusion detection, In IEEE Canadian Conference on Electrical and Computer Engineering, Proceedings, 2003.
-
(2003)
-
-
Guan, Y.1
Ghorbani, A.2
Belacel, N.3
-
17
-
-
84908184337
-
-
Unsupervised anomaly detection in network intrusion detection using clusters, ACSC2005
-
Leung K, Leckie C. Unsupervised anomaly detection in network intrusion detection using clusters, ACSC2005, 2005.
-
(2005)
-
-
Leung, K.1
Leckie, C.2
-
18
-
-
68149183221
-
A clustering method for improving performance of anomaly-based intrusion detection system
-
E91-D
-
Song J, Ohira K, Takakura H, Okabe Y, Kwon Y. A clustering method for improving performance of anomaly-based intrusion detection system. IEICE Transactions on Information and Communication System Security 2008; E91-D(5):1282-1291.
-
(2008)
IEICE Transactions on Information and Communication System Security
, Issue.5
, pp. 1282-1291
-
-
Song, J.1
Ohira, K.2
Takakura, H.3
Okabe, Y.4
Kwon, Y.5
-
19
-
-
53849091351
-
-
A generalized feature extraction scheme to detect 0-day attacks via IDS alerts, The 2008 International Symposium on Applications and the Internet (SAINT2008), The IEEE CS Press, July - 1 Aug.
-
Song J, Takakura H, Kwon Y. A generalized feature extraction scheme to detect 0-day attacks via IDS alerts, The 2008 International Symposium on Applications and the Internet (SAINT2008), The IEEE CS Press, July - 1 Aug. 2008; 28: 51-56.
-
(2008)
, vol.28
, pp. 51-56
-
-
Song, J.1
Takakura, H.2
Kwon, Y.3
-
20
-
-
84908184336
-
-
A comparative study of anomaly detection schemes in network intrusion detection, In Proceedings of the Third SIAM International Conference on Data Mining
-
Lazarevic A, Ertoz L, Kumar V, Ozgur A, Srivastava J. A comparative study of anomaly detection schemes in network intrusion detection, In Proceedings of the Third SIAM International Conference on Data Mining, 2003.
-
(2003)
-
-
Lazarevic, A.1
Ertoz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
-
21
-
-
37249023319
-
-
Comparative study of unsupervised machine learning and data mining techniques for intrusion detection, MLDM 2007, LNAI 4571
-
Reza S, Ali A, Ghorbani A. Comparative study of unsupervised machine learning and data mining techniques for intrusion detection, MLDM 2007, LNAI 4571, 2007; 404-418.
-
(2007)
, pp. 404-418
-
-
Reza, S.1
Ali, A.2
Ghorbani, A.3
-
23
-
-
84908184334
-
-
The Honeynet Project,
-
The Honeynet Project, http://www.honeynet.org/.
-
-
-
-
24
-
-
33846316416
-
Scriptgen: an automated script generation tool for honeyd
-
Proceedings of the 21st Annual Computer Security Applications Conference
-
Leita C, Mermoud K, Dacier M. Scriptgen: an automated script generation tool for honeyd, In Proceedings of the 21st Annual Computer Security Applications Conference, 2005.
-
(2005)
-
-
Leita, C.1
Mermoud, K.2
Dacier, M.3
-
25
-
-
55149104663
-
-
Cooperation of intelligent honeypots to detect unknown malicious codes, WISTDCS 2008, IEEE CS Press
-
Song J, Takakura H, Yasuo O. Cooperation of intelligent honeypots to detect unknown malicious codes, WISTDCS 2008, IEEE CS Press, 2008; 31-39.
-
(2008)
, pp. 31-39
-
-
Song, J.1
Takakura, H.2
Yasuo, O.3
-
26
-
-
84908184331
-
-
HoneyTrap,
-
HoneyTrap, http://honeytrap.mwcollect.org/.
-
-
-
-
27
-
-
33646000916
-
The internet motion sensor: a distributed blackhole monitoring system
-
Proceedings of the 12th ISOC Symposium on Network and Distributed Systems Security (NDSS), Citeseer
-
Bailey M, Cooke E, Jahanian F, Nazario J, Watson D. The internet motion sensor: a distributed blackhole monitoring system, In Proceedings of the 12th ISOC Symposium on Network and Distributed Systems Security (NDSS), Citeseer, 2005; 167-179.
-
(2005)
, pp. 167-179
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
28
-
-
84908184330
-
-
Network telescopes, technical report. CAIDA, April .
-
Moore D, Shannon C, Voelker GM, Savage S. Network telescopes, technical report. CAIDA, April 2004.
-
(2004)
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
29
-
-
44049086375
-
-
Practical darknet measurement, In Information Sciences and Systems, 2006 40th Annual Conference, IEEE
-
Bailey M, Cooke E, Jahanian F, Myrick A, Sinha S. Practical darknet measurement, In Information Sciences and Systems, 2006 40th Annual Conference, IEEE, 2007; 1496-1501.
-
(2007)
, pp. 1496-1501
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Myrick, A.4
Sinha, S.5
-
30
-
-
76249083391
-
Practical correlation analysis between scan and malware profiles against zero-day attacks based on darknet monitoring
-
Nakao K, Inoue D, Eto M, Yoshioka K. Practical correlation analysis between scan and malware profiles against zero-day attacks based on darknet monitoring. IEICE Transactions on Information and Systems 2009; 92(5):787-798.
-
(2009)
IEICE Transactions on Information and Systems
, vol.92
, Issue.5
, pp. 787-798
-
-
Nakao, K.1
Inoue, D.2
Eto, M.3
Yoshioka, K.4
-
31
-
-
79958707632
-
nicter: a large-scale network incident analysis system
-
In, ACM: Salzburg, Austria, 10-13 April
-
Masashi E, Daisuke I, Song J, Junji N, Kazuhiro O, Nakao K. nicter: a large-scale network incident analysis system. In Workshop on development of large scale security-related data collection and analysis initiatives (BADGERS 2011), ACM: Salzburg, Austria, 10-13 April 2011; 37-45.
-
(2011)
Workshop on development of large scale security-related data collection and analysis initiatives (BADGERS 2011)
, pp. 37-45
-
-
Masashi, E.1
Daisuke, I.2
Song, J.3
Junji, N.4
Kazuhiro, O.5
Nakao, K.6
-
32
-
-
84908176145
-
-
An advanced security monitoring and response framework using darknet traffic, 2012 International Workshop on INFORMATION & SECURITY
-
Choi SS, Kim SH, Park HS. An advanced security monitoring and response framework using darknet traffic, 2012 International Workshop on INFORMATION & SECURITY, 2012; 9-10.
-
(2012)
, pp. 9-10
-
-
Choi, S.S.1
Kim, S.H.2
Park, H.S.3
-
33
-
-
84908220263
-
An advanced incident response framework based on suspicious traffic
-
Choi SS, Song JS, Park HS, Choi JK. An advanced incident response framework based on suspicious traffic. The Journal of Future Game Technology 2012; 2(2):171-176.
-
(2012)
The Journal of Future Game Technology
, vol.2
, Issue.2
, pp. 171-176
-
-
Choi, S.S.1
Song, J.S.2
Park, H.S.3
Choi, J.K.4
-
34
-
-
84908184329
-
A fusion framework of IDS alerts and darknet traffic for effective incident monitoring and response
-
Choi SS, Kim SH, Park HS. A fusion framework of IDS alerts and darknet traffic for effective incident monitoring and response, Applied Mathematics & Information Sciences 2013.
-
(2013)
Applied Mathematics & Information Sciences
-
-
Choi, S.S.1
Kim, S.H.2
Park, H.S.3
-
35
-
-
84869050088
-
-
A malware collection and Analysis framework based on darknet traffic, ICONIP2012, LNCS
-
Song J, Choi J, Choi S. A malware collection and Analysis framework based on darknet traffic, ICONIP2012, LNCS, 2012; 624-631.
-
(2012)
, pp. 624-631
-
-
Song, J.1
Choi, J.2
Choi, S.3
|