Discovering Novel Multistage Attack Strategies
暂无分享,去创建一个
Dong Li | Zhitang Li | Li Wang | Aifang Zhang
[1] Alfonso Valdes,et al. Probabilistic Alert Correlation , 2001, Recent Advances in Intrusion Detection.
[2] Ramakrishnan Srikant,et al. Mining sequential patterns , 1995, Proceedings of the Eleventh International Conference on Data Engineering.
[3] Wenke Lee,et al. Statistical Causality Analysis of INFOSEC Alert Data , 2003, RAID.
[4] Peng Ning,et al. Alert correlation through triggering events and common resources , 2004, 20th Annual Computer Security Applications Conference.
[5] Peng Ning,et al. Techniques and tools for analyzing intrusion alerts , 2004, TSEC.
[6] Frédéric Cuppens,et al. Managing alerts in a multi-intrusion detection environment , 2001, Seventeenth Annual Computer Security Applications Conference.
[7] Suh-Yin Lee,et al. Incremental update on sequential patterns in large databases , 1998, Proceedings Tenth IEEE International Conference on Tools with Artificial Intelligence (Cat. No.98CH36294).
[8] Ramakrishnan Srikant,et al. Mining Sequential Patterns: Generalizations and Performance Improvements , 1996, EDBT.
[9] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[10] Frédéric Cuppens,et al. Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[11] Frédéric Cuppens,et al. Correlation in an intrusion detection process , 2002 .
[12] Ramakrishna Thurimella,et al. A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures , 2006, RAID.
[13] Jiawei Han,et al. IncSpan: incremental mining of sequential patterns in large database , 2004, KDD.
[14] Heikki Mannila,et al. Discovering Frequent Episodes in Sequences , 1995, KDD.
[15] Peng Ning,et al. Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.
[16] Fan Jun,et al. Learning attack strategies through attack sequence mining method , 2006, 2006 International Conference on Communication Technology.
[17] Wenke Lee,et al. Discovering Novel Attack Strategies from INFOSEC Alerts , 2004, ESORICS.
[18] Ming-Yuh Huang,et al. A large scale distributed intrusion detection framework based on attack strategy analysis , 1999, Comput. Networks.
[19] Maguelonne Teisseire,et al. Incremental mining of sequential patterns in large databases , 2003, Data Knowl. Eng..