Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
暂无分享,去创建一个
[1] Robert K. Cunningham,et al. Fusing A Heterogeneous Alert Stream Into Scenarios , 2002, Applications of Data Mining in Computer Security.
[2] Marc Dacier,et al. Mining intrusion detection alarms for actionable knowledge , 2002, KDD.
[3] Sushil Jajodia,et al. Topological analysis of network attack vulnerability , 2006, PST.
[4] Sushil Jajodia,et al. Correlating intrusion events and building attack scenarios through attack graph distances , 2004, 20th Annual Computer Security Applications Conference.
[5] Frédéric Cuppens,et al. Managing alerts in a multi-intrusion detection environment , 2001, Seventeenth Annual Computer Security Applications Conference.
[6] Peng Ning,et al. Adapting Query Optimization Techniques for Efficient Intrusion Alert Correlation , 2002 .
[7] Indrajit Ray,et al. Using Attack Trees to Identify Malicious Attacks from Authorized Insiders , 2005, ESORICS.
[8] Paul Ammann,et al. Using model checking to analyze network vulnerabilities , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[9] Wenke Lee,et al. Discovering Novel Attack Strategies from INFOSEC Alerts , 2004, ESORICS.
[10] Peng Ning,et al. Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.
[11] Eugene H. Spafford,et al. The COPS Security Checker System , 1990, USENIX Summer.
[12] Alfonso Valdes,et al. Probabilistic Alert Correlation , 2001, Recent Advances in Intrusion Detection.
[13] Wenke Lee,et al. Statistical Causality Analysis of INFOSEC Alert Data , 2003, RAID.
[14] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[15] Frédéric Cuppens,et al. LAMBDA: A Language to Model a Database for Detection of Attacks , 2000, Recent Advances in Intrusion Detection.
[16] Yi Zhang,et al. Performance Adaptation in Real-Time Intrusion Detection Systems , 2002, RAID.
[17] Hervé Debar,et al. M2D2: A Formal Data Model for IDS Alert Correlation , 2002, RAID.
[18] Sushil Jajodia,et al. An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts , 2005, ESORICS.
[19] Peng Ning,et al. Privacy-preserving alert correlation: a concept hierarchy based approach , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[20] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[21] Steven J. Templeton,et al. A requires/provides model for computer attacks , 2001, NSPW '00.
[22] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[23] Ulf Lindqvist,et al. Integration of Next-Generation Intrusion Detection System/Event Monitoring Enabling Responses to Anomalous Live Disturbances (NIDES/EMERALD) Intrusion Detection Engines with the International Office of Standardization (ISO) Architecture , 2002 .
[24] Robert Cole,et al. Computer Communications , 1982, Springer New York.
[25] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[26] Naji Habra,et al. ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis , 1992, ESORICS.
[27] Hervé Debar,et al. Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.
[28] Karl N. Levitt,et al. NetKuang - A Multi-Host Configuration Vulnerability Checker , 1996, USENIX Security Symposium.
[29] Robert K. Cunningham,et al. Building Scenarios from a Heterogeneous Alert Stream , 2001 .
[30] Gary Carpenter. 동적 사용자를 위한 Scalable 인증 그룹 키 교환 프로토콜 , 2005 .
[31] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[32] Peng Ning,et al. Learning attack strategies from intrusion alerts , 2003, CCS '03.
[33] Rodolphe Ortalo,et al. Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security , 1999, IEEE Trans. Software Eng..
[34] Stuart Staniford-Chen,et al. Practical Automated Detection of Stealthy Portscans , 2002, J. Comput. Secur..
[35] Giovanni Vigna,et al. STATL: An Attack Language for State-Based Intrusion Detection , 2002, J. Comput. Secur..
[36] Peng Ning,et al. Building Attack Scenarios through Integration of Complementary Alert Correlation Method , 2004, NDSS.
[37] Hung Q. Ngo,et al. Towards a theory of insider threat assessment , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[38] Frédéric Cuppens,et al. Alert correlation in a cooperative intrusion detection framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[39] Sushil Jajodia,et al. Efficient minimum-cost network hardening via exploit dependency graphs , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[40] Steven Noel,et al. Representing TCP/IP connectivity for topological analysis of network security , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[41] Peng Ning,et al. Alert correlation through triggering events and common resources , 2004, 20th Annual Computer Security Applications Conference.
[42] Peng Ning,et al. Reasoning about complementary intrusion evidence , 2004, 20th Annual Computer Security Applications Conference.