A survey on IDS alerts processing techniques
暂无分享,去创建一个
[1] Frédéric Cuppens,et al. Managing alerts in a multi-intrusion detection environment , 2001, Seventeenth Annual Computer Security Applications Conference.
[2] Frédéric Cuppens,et al. Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[3] Peng Ning,et al. Correlating Alerts Using Prerequisites of Intrusions , 2001 .
[4] Alfonso Valdes,et al. Probabilistic Alert Correlation , 2001, Recent Advances in Intrusion Detection.
[5] Robert K. Cunningham,et al. Building Scenarios from a Heterogeneous Alert Stream , 2001 .
[6] Rayford B. Vaughn,et al. A unified alert fusion model for intelligent analysis of sensor data in an intrusion detection environment , 2006 .
[7] Klaus Julisch,et al. Mining alarm clusters to improve alarm handling efficiency , 2001, Seventeenth Annual Computer Security Applications Conference.
[8] ManganarisStefanos,et al. A data mining analysis of RTID alarms , 2000 .
[9] Tadeusz Pietraszek,et al. Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection , 2004, RAID.
[10] Wenke Lee,et al. Statistical Causality Analysis of INFOSEC Alert Data , 2003, RAID.
[11] Fabien Pouget,et al. Alert correlation: Review of the state of the art , 2003 .
[12] Hervé Debar,et al. Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.
[13] Hyunsoo Yoon,et al. Real-time analysis of intrusion detection alerts via correlation , 2006, Comput. Secur..
[14] Christopher Krügel,et al. Comprehensive approach to intrusion detection alert correlation , 2004, IEEE Transactions on Dependable and Secure Computing.
[15] Christopher Krügel,et al. Alert Verification Determining the Success of Intrusion Attempts , 2004, DIMVA.
[16] Sushil Jajodia,et al. Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts , 2006, Comput. Commun..
[17] Peng Ning,et al. Building Attack Scenarios through Integration of Complementary Alert Correlation Method , 2004, NDSS.
[18] Udo W. Pooch,et al. Alert aggregation in mobile ad hoc networks , 2003, WiSe '03.
[19] Stefanos Manganaris,et al. A Data Mining Analysis of RTID Alarms , 2000, Recent Advances in Intrusion Detection.
[20] Klaus Julisch,et al. Clustering intrusion detection alarms to support root cause analysis , 2003, TSEC.