A comprehensive approach to intrusion detection alert correlation (2004)

by Fredrik Valeur , Giovanni Vigna , Christopher Kruegel , Richard A. Kemmerer
Venue:IEEE Transactions on Dependable and Secure Computing
Citations:66 - 3 self

Active Bibliography

TIAA: A Visual Toolkit for Intrusion Alert Analysis – Peng Ning, Pai Peng, Yiquan Hu, Dingbang Xu
22 Techniques and Tools for Analyzing Intrusion Alerts – Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu - 2004
1 Facilitating Alert Correlation Using Resource Trees – Tion Of Dr. Peng Ning, Jaideep Mahalati - 2005
8 Intrusion detection and Correlation -- Challenges and Solutions – Christopher Kruegel, Fredrik Valeur, Giovanni Vigna
1 Sensor Families For Intrusion Detection Infrastructures – Richard A. Kemmerer, Giovanni Vigna - 2004
MAIDS for VoIP: A Mobile Agents-based Intrusion Detection System for Voice over Internet Protocol – Christian Chita - 2008
43 Intrusion and Intrusion Detection – John Mchugh - 2001
6 INTRUSION DETECTION: A SURVEY – Aleksandar Lazarevic, Vipin Kumar, Jaideep Srivastava - 2005
5 Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts – Lingyu Wang, Anyi Liu, Sushil Jajodia - 2006
24 Learning Attack Strategies from Intrusion Alerts – Peng Ning, Dingbang Xu - 2003
16 Reasoning about Complementary Intrusion Evidence – Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves - 2004
6 Alert Correlation through Triggering Events and Common Resources – Dingbang Xu , Peng Ning - 2004
and – Jingmin Zhou, Mark Heckman, Brennen Reynolds, Promia Inc, Adam Carlson, Matt Bishop
7 Using alert verification to identify successful intrusion attempts – Christopher Kruegel, William Robertson, Giovanni Vigna - 2004
30 Modeling Multistep Cyber Attacks for Scenario Recognition – Steven Cheung, Ulf Lindqvist, Martin W. Fong - 2003
108 Constructing attack scenarios through correlation of intrusion alerts – Peng Ning, Douglas S. Reeves
13 Building Attack Scenarios through Integration of Complementary Alert Correlation Methods – Peng Ning, Dingbang Xu, Christopher G. Healey, Robert St. Amant - 2004
4 Survey of Intrusion Detection Research – Emilie Lundin, Erland Jonsson - 2002
next goal with – Dong Yu, Deborah Frincke - 2006