Information Technology Reference
In-Depth Information
2. Qin, X., Lee, W.: Statistical Causality Analysis of INFOSEC Alert Data. In: Vigna, G.,
Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 73-93. Springer, Heidel-
berg (2003)
3. Qin, X., Lee, W.: Discovering Novel Attack Strategies from INFOSEC Alerts. In: Samara-
ti, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp.
439-456. Springer, Heidelberg (2004)
4. Ning, P., Cui, Y., Reeves, D.S.: Constructing Attacks Scenarios Through Correlation of In-
trusion Alerts. In: Proceedings of the 9th ACM Conference on Computer and Communica-
tions Security. ACM Press, New York (2002)
5. Fritzke, B.: A growing neural gas network learns topologies. In: Advances in Neural In-
formation Processing Systems, vol. 7. MIT Press, Cambridge (1995)
6. Abdel-Azim, M., Abdel-Fatah, A., Awad, M.: Performance Analys of Artificial Neural
Network Intrusion Detection Systems. In: Proceedings of International Conference on
Electrical and Electronics Engineering, Bursa, Turkey, pp. 385-389 (2009)
7. Lorenzo-Fonseca, I., Maciá-Pérez, F., Mora-Gimeno, F.J., Lau-Fernández, R., Gil-
Martínez-Abarca, J.A., Marcos-Jorquera, D.: Intrusion Detection Method Using Neural
Networks Based on the Reduction of Characteristics. In: Cabestany, J., Sandoval, F., Prie-
to, A., Corchado, J.M. (eds.) IWANN 2009. LNCS, vol. 5517, pp. 1296-1303. Springer,
Heidelberg (2009)
8. Shun, J., Malki, H.A.: Network Intrusion Detection System Using Neural Networks. In:
Proceedings of International Conference on Natural Computation, Jinan, China, pp. 242-
249 (2008)
9. Liu, G., Wang, X.: An Integrated Intrusion Detection System by Using Multiple Neural
Networks. In: Proceedings of IEEE Conference on Cybernetics and Intelligent Systems,
Chengdu, China, pp. 22-27 (2008)
10. Tenfl, P., Payer, U., Fellner, R.: Event Correlation on the Basis of Activation Patterns. In:
Proceedings of International Conference on Parallel, Distributed, and Network-Based
Processing, Pisa, Italy, pp. 631-640 (2010)
11. Morin, B., Me, L., Debar, H., Ducasse, M.: A Logic-Based Model to Support Alert Corre-
lation in Intrusion Detection. Information Fusion 10(4), 285-299 (2009)
12. Zhou, J., Hechman, M., Reynolds, B., Carlson, A., Bishop, M.: Modeling Network Intru-
sion Detection Alerts for Correlation. ACM Transactions on Information and System Secu-
rity 10(1), 1-31 (2007)
13. Gu, T., Xiao, D., Liu, X., Xia, X.: Multilevel Event Correlation Based on Collaboration
and Temporal Causal Correlation. In: Proceedings of International Conference on Wireless
Communications, Networking and Mobile Computint, Beijing, China, pp. 1-4 (2009)
14. Ning, P., Xu, D., Healey, C.G., Amant, R.: Building Attacks Scenarios Through Integra-
tion of Complementary Alert Correlation Method. In: Proceedings of Network and Distri-
buted System Security Symposium, San Diego, USA, pp. 69-84 (2004)
15. Gu, G., Fogla, P., Dagon, D., Lee, W., Skoric, B.: Measuring Intrusion Detection Capabili-
ty: An Information_Theoretic Approack. In: Proceedings of ACM Symposium on Informa-
tion, Computer and Communications Security. ACM Press, New York (2006)
16. Debar, H., Curry, D., Feinstein, B.: The Intrusion Detection Message Exchange Format
(IDMEF). RFC 4765. IETF Trust (2007)
17. Valdes, A., Skinner, K.: Probabilistic Alert Correlation. In: Lee, W., Mé, L., Wespi, A.
(eds.) RAID 2001. LNCS, vol. 2212, pp. 54-68. Springer, Heidelberg (2001)
18. MIT Lincoln Laboratory: DARPA Intrusion Detection Evaluation,
http://www.ll.mit.edu/IST/ideval/index.html
 
Search WWH ::




Custom Search