Understanding multistage attacks by attack-track based visualization of heterogeneous event streams
暂无分享,去创建一个
Adam Stotz | Moises Sudit | Shambhu J. Upadhyaya | Sunu Mathew | Richard Giomundo | S. Upadhyaya | M. Sudit | A. Stotz | S. Mathew | R. Giomundo
[1] Sushil Jajodia,et al. Correlating intrusion events and building attack scenarios through attack graph distances , 2004, 20th Annual Computer Security Applications Conference.
[2] Robert F. Erbacher,et al. Designing visualization capabilities for IDS challenges , 2005, IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)..
[3] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[4] S. Upadhyaya,et al. Real-time multistage attack awareness through enhanced intrusion alert clustering , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[5] Sushil Jajodia,et al. Topological analysis of network attack vulnerability , 2006, PST.
[6] Stuart McClure,et al. Hacking Exposed: Network Security Secrets and Solutions, Fourth Edition , 2001 .
[7] Yarden Livnat,et al. A visualization paradigm for network intrusion detection , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[8] Yifan Li,et al. VisFlowConnect: netflow visualizations of link relationships for security situational awareness , 2004, VizSEC/DMSEC '04.
[9] Wayne G. Lutters,et al. Preserving the big picture: visual network traffic analysis with TNV , 2005, IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)..
[10] Alfonso Valdes,et al. Scalable visualization of propagating internet phenomena , 2004, VizSEC/DMSEC '04.
[11] Deborah A. Frincke,et al. Intrusion and Misuse Detection in Large-Scale Systems , 2002, IEEE Computer Graphics and Applications.
[12] Sushil Jajodia,et al. Multiple coordinated views for network attack graphs , 2005, IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)..
[13] Stephen Taylor,et al. Validation of Sensor Alert Correlators , 2003, IEEE Secur. Priv..
[14] Stuart McClure,et al. Hacking Exposed; Network Security Secrets and Solutions , 1999 .
[15] Shambhu J. Upadhyaya,et al. An alert fusion framework for situation awareness of coordinated multistage attacks , 2005, Third IEEE International Workshop on Information Assurance (IWIA'05).
[16] Hideki Koike,et al. Visualizing cyber attacks using IP matrix , 2005, IEEE Workshop on Visualization for Computer Security, 2005. (VizSEC 05)..
[17] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.