A multi-step attack-correlation method with privacy protection
暂无分享,去创建一个
[1] Somesh Jha,et al. Global Intrusion Detection in the DOMINO Overlay System , 2004, NDSS.
[2] Michele Colajanni,et al. Multistep Attack Detection and Alert Correlation in Intrusion Detection Systems , 2011, ISA.
[3] Adam Carlson,et al. Modeling network intrusion detection alerts for correlation , 2007, ACM Trans. Inf. Syst. Secur..
[4] Peng Ning,et al. Techniques and tools for analyzing intrusion alerts , 2004, TSEC.
[5] Jennifer Rexford,et al. Privacy-preserving collaborative anomaly detection , 2009 .
[6] Jianhua Li,et al. Building network attack graph for alert causal correlation , 2008, Comput. Secur..
[7] Rajeev Motwani,et al. Approximation Algorithms for k-Anonymity , 2005 .
[8] Hervé Debar,et al. Correlation of Intrusion Symptoms: An Application of Chronicles , 2003, RAID.
[9] Hervé Debar,et al. Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.
[10] Ramakrishnan Srikant,et al. Mining Sequential Patterns: Generalizations and Performance Improvements , 1996, EDBT.
[11] Salvatore J. Stolfo,et al. Privacy-preserving payload-based correlation for accurate malicious traffic detection , 2006, LSAD '06.