A Flexible Approach to Intrusion Alert Anonymization and Correlation
暂无分享,去创建一个
[1] Hervé Debar,et al. M2D2: A Formal Data Model for IDS Alert Correlation , 2002, RAID.
[2] Frédéric Cuppens,et al. Managing alerts in a multi-intrusion detection environment , 2001, Seventeenth Annual Computer Security Applications Conference.
[3] Somesh Jha,et al. Global Intrusion Detection in the DOMINO Overlay System , 2004, NDSS.
[4] Steven J. Templeton,et al. A requires/provides model for computer attacks , 2001, NSPW '00.
[5] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, CSUR.
[6] Stuart Staniford-Chen,et al. Practical Automated Detection of Stealthy Portscans , 2002, J. Comput. Secur..
[7] Hervé Debar,et al. Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.
[8] Alexandre V. Evfimievski,et al. Limiting privacy breaches in privacy preserving data mining , 2003, PODS.
[9] Hervé Debar,et al. Correlation of Intrusion Symptoms: An Application of Chronicles , 2003, RAID.
[10] T Lewis,et al. Protecting privacy , 1997, The Lancet.
[11] Klaus Julisch,et al. Clustering intrusion detection alarms to support root cause analysis , 2003, TSEC.
[12] Steven P. Reiss. Practical Data-Swapping: The First Steps , 1980, 1980 IEEE Symposium on Security and Privacy.
[13] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[14] Peng Ning,et al. Hypothesizing and reasoning about attacks missed by intrusion detection systems , 2004, TSEC.
[15] Alfonso Valdes,et al. Probabilistic Alert Correlation , 2001, Recent Advances in Intrusion Detection.
[16] Rakesh Agrawal,et al. Privacy-preserving data mining , 2000, SIGMOD 2000.
[17] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[18] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[19] Vern Paxson,et al. A high-level programming environment for packet trace anonymization and transformation , 2003, SIGCOMM '03.
[20] Chong K. Liew,et al. A data distortion by probability distribution , 1985, TODS.
[21] Alfonso Valdes,et al. A Mission-Impact-Based Approach to INFOSEC Alarm Correlation , 2002, RAID.
[22] Frédéric Cuppens,et al. Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[23] Peng Ning,et al. Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.
[24] Vitaly Shmatikov,et al. Privacy-Preserving Sharing and Correlation of Security Alerts , 2004, USENIX Security Symposium.
[25] Peng Ning,et al. Privacy-preserving alert correlation: a concept hierarchy based approach , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[26] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[27] Henryk Wozniakowski,et al. The statistical security of a statistical database , 1984, TODS.