Spotting Intrusion Scenarios from Firewall Logs Through a Case-Based Reasoning Approach
暂无分享,去创建一个
Cristina Melchiors | Luciano Paschoal Gaspary | Fábio Elias Locatelli | Fabiane Dillenburg | Samir Lohmann | L. Gaspary | F. Dillenburg | Cristina Melchiors | Samir Lohmann
[1] Alfonso Valdes,et al. A Mission-Impact-Based Approach to INFOSEC Alarm Correlation , 2002, RAID.
[2] Janet L. Kolodner,et al. Case-Based Reasoning , 1989, IJCAI 1989.
[3] Sara Stoecklin,et al. A case-based approach to network intrusion detection , 2002, Proceedings of the Fifth International Conference on Information Fusion. FUSION 2002. (IEEE Cat.No.02EX5997).
[4] Hervé Debar,et al. Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.
[5] Josef Pieprzyk,et al. Case-based reasoning for intrusion detection , 1996, Proceedings 12th Annual Computer Security Applications Conference.
[6] Peng Ning,et al. Analyzing Intensive Intrusion Alerts via Correlation , 2002, RAID.
[7] Vinod Yegneswaran,et al. Internet intrusions: global characteristics and prevalence , 2003, SIGMETRICS '03.