메뉴 건너뛰기




Volumn 2516, Issue , 2002, Pages 74-94

Analyzing intensive intrusion alerts via correlation

Author keywords

Alert correlation; Attack scenario analysis; Intrusion detection

Indexed keywords

CORRELATION METHODS; MERCURY (METAL);

EID: 84958963784     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36084-0_5     Document Type: Conference Paper
Times cited : (80)

References (24)
  • 2
    • 0002067431 scopus 로고    scopus 로고
    • NetSTAT: A network-based intrusion detection system
    • Vigna, G., Kemmerer, R.A.: NetSTAT: A network-based intrusion detection system. Journal of Computer Security 7 (1999) 37–71
    • (1999) Journal of Computer Security , vol.7 , pp. 37-71
    • Vigna, G.1    Kemmerer, R.A.2
  • 6
    • 26344452646 scopus 로고    scopus 로고
    • Correlating alerts using prerequisites of intrusions. Technical Report TR-2001-13, North Carolina State University
    • Ning, P., Reeves, D.S., Cui, Y.: Correlating alerts using prerequisites of intrusions. Technical Report TR-2001-13, North Carolina State University, Department of Computer Science (2001)
    • (2001) Department of Computer Science
    • Ning, P.1    Reeves, D.S.2    Cui, Y.3
  • 7
    • 1642351593 scopus 로고    scopus 로고
    • An intrusion alert correlator based on prerequisites of intrusions. Technical Report TR-2002-01, North Carolina State University
    • Ning, P., Cui, Y.: An intrusion alert correlator based on prerequisites of intrusions. Technical Report TR-2002-01, North Carolina State University, Department of Computer Science (2002)
    • (2002) Department of Computer Science
    • Ning, P.1    Cui, Y.2
  • 8
    • 84969375739 scopus 로고    scopus 로고
    • MIT Lincoln Lab: 2000 DARPA intrusion detection scenario specific datasets. http://www.ll.mit.edu/IST/ideval/data/2000/2000 data index.html (2000)
    • (2000)
  • 10
    • 84959006924 scopus 로고    scopus 로고
    • Archive accessible at http://wi2600.org/mediawhore/mirrors/shmoo/
    • DEFCON: Def con capture the flag (CTF) contest. http://www.defcon.org/html/defcon-8-post.html (2000) Archive accessible at http://wi2600.org/mediawhore/mirrors/shmoo/.
    • (2000)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.