A comprehensive approach to intrusion detection alert correlation (2004)

by Fredrik Valeur , Giovanni Vigna , Christopher Kruegel , Richard A. Kemmerer
Venue:IEEE Transactions on Dependable and Secure Computing
Citations:66 - 3 self

Documents Related by Co-Citation

108 Constructing attack scenarios through correlation of intrusion alerts – Peng Ning, Douglas S. Reeves
144 Probabilistic Alert Correlation – Alfonso Valdes, Keith Skinner - 2001
173 Alert correlation in a cooperative intrusion detection framework – F Cuppens, A Mige - 2002
822 Snort - Lightweight Intrusion Detection for Networks – Martin Roesch, Stanford Telecommunications - 1999
85 Intrusion Detection Systems & Multisensor Data Fusion: Creating Cyberspace Situational Awareness – Tim Bass - 2000
22 Techniques and Tools for Analyzing Intrusion Alerts – Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu - 2004
195 Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory – J Mchugh
62 A mission-impact-based approach to INFOSEC alarm correlation – Phillip A. Porras, Martin W. Fong, Alfonso Valdes - 2002
7 an open source network intrusion prevention and detection system,” 2008. [Online]. Available: http://www.snort.org – “Snort Sourcefire
22 Attack Plan Recognition and Prediction Using Causal Networks – X Qin, W Lee
619 Text Compression – T Bell, J Cleary, I Witten - 1990
69 M2d2: A formal data model for ids alert correlation – Benjamin Morin, Ludovic Mé, Hervé Debar, Mireille Ducassé - 2002
112 STATL: An Attack Language for State-based Intrusion Detection – Steven Eckmann , Giovanni Vigna, Richard A. Kemmerer - 2002
686 Bro: A System for Detecting Network Intruders in Real-Time – Vern Paxson - 1999
85 NetSTAT: A Network-based Intrusion Detection Approach – Giovanni Vigna , Richard A. Kemmerer - 1998
200 Anomalous payload-based network intrusion detection – Ke Wang, Salvatore J. Stolfo - 2004
44 Enriching intrusion alerts through multi-host causality – Samuel T. King, Z. Morley Mao, Dominic G. Lucchetti, Peter M. Chen - 2005
30 Modeling Multistep Cyber Attacks for Scenario Recognition – Steven Cheung, Ulf Lindqvist, Martin W. Fong - 2003
113 A Requires/Provides Model for Computer Attacks – Steven J. Templeton, Karl Levitt - 2000