Classification of Malicious Distributed SELinux Activities
暂无分享,去创建一个
[1] Xinzhou Qin,et al. A Probabilistic-Based Framework for INFOSEC Alert Correlation , 2005 .
[2] David Eppstein. Diameter and Treewidth in Minor-Closed Graph Families , 2000, Algorithmica.
[3] Giovanni Vigna,et al. STATL: An Attack Language for State-Based Intrusion Detection , 2002, J. Comput. Secur..
[4] Jérémy Briffaut,et al. Collaboration between MAC Policies and IDS based on a Meta-Policy approach , 2006, International Symposium on Collaborative Technologies and Systems (CTS'06).
[5] Christopher Krügel,et al. Comprehensive approach to intrusion detection alert correlation , 2004, IEEE Transactions on Dependable and Secure Computing.
[6] Pau-Chen Cheng,et al. BlueBoX: A policy-driven, host-based intrusion detection system , 2003, TSEC.
[7] Peng Ning,et al. Correlating Alerts Using Prerequisites of Intrusions , 2001 .
[8] Christopher Krügel,et al. Intrusion Detection and Correlation - Challenges and Solutions , 2004, Advances in Information Security.
[9] Christopher Krügel,et al. Decentralized Event Correlation for Intrusion Detection , 2001, ICISC.
[10] Bill MacCarty,et al. SELinux - NSA's open source security enhanced linux: beating the o-day vulnerability threat , 2005 .
[11] Michel Cukier,et al. Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences , 2007, ICISC.
[12] Bill McCarty,et al. Selinux: NSA's Open Source Security Enhanced Linux , 2004 .
[13] Frédéric Cuppens,et al. Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.