A comprehensive approach to intrusion detection alert correlation (2004)

by Fredrik Valeur , Giovanni Vigna , Christopher Kruegel , Richard A. Kemmerer
Venue:IEEE Transactions on Dependable and Secure Computing
Citations:76 - 3 self

Documents Related by Co-Citation

108 Constructing attack scenarios through correlation of intrusion alerts – Peng Ning, Douglas S. Reeves
145 Probabilistic Alert Correlation – Alfonso Valdes, Keith Skinner - 2001
175 Alert Correlation In A Cooperative Intrusion Detection Framework – F Cuppens, A Miege - 2002
85 Intrusion Detection Systems & Multisensor Data Fusion: Creating Cyberspace Situational Awareness – Tim Bass - 2000
22 Techniques and Tools for Analyzing Intrusion Alerts – Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu - 2004
30 Modeling Multistep Cyber Attacks for Scenario Recognition – Steven Cheung, Ulf Lindqvist, Martin W. Fong - 2003
44 Enriching intrusion alerts through multi-host causality – Samuel T. King, Z. Morley Mao, Dominic G. Lucchetti, Peter M. Chen - 2005
195 Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory – J Mchugh
825 Snort - Lightweight Intrusion Detection for Networks – Martin Roesch, Stanford Telecommunications - 1999
62 A mission-impact-based approach to INFOSEC alarm correlation – Phillip A. Porras, Martin W. Fong, Alfonso Valdes - 2002
4 Context-Based Intrusion Detection Using Snort, Nessus and Bugtraq Databases – Frederic Massicotte, Lionel C. Briand, Mathieu Couture, Yvan Labiche - 2005
10 Using vulnerability trees for decision making in threat assessment – S Vidalis, S Vidalis, A Jones, A Jones, Stilianos Vidalis, Andy Jones - 2003
104 A graph-based system for network-vulnerability analysis – Cynthia Phillips - 1998
7 an open source network intrusion prevention and detection system,” 2008. [Online]. Available: http://www.snort.org – “Snort Sourcefire
12 Tools and techniques for analyzing intrusion alerts – Peng Ning, Yun Cui, Douglas Reeves, Dingbang Xu
60 Fusing a Heterogeneous Alert Stream into Scenarios – Oliver Dain, Robert K. Cunningham - 2001
9 Tandi: Threat assessment for networked data and information – J Holsopple, S J Yang, M Sudit - 2006
618 Text Compression – Timothy C Bell, John G Cleary, Ian H Witten - 1990
23 Attack plan recognition and prediction using causal networks – X Qin, W Lee - 2004