A comprehensive approach to intrusion detection alert correlation (2004)

by Fredrik Valeur , Giovanni Vigna , Christopher Kruegel , Richard A. Kemmerer
Venue:IEEE Transactions on Dependable and Secure Computing
Citations:66 - 3 self

Documents Related by Co-Citation

108 Constructing attack scenarios through correlation of intrusion alerts – Peng Ning, Douglas S. Reeves
195 Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory – J Mchugh
144 Probabilistic Alert Correlation – Alfonso Valdes, Keith Skinner - 2001
173 Alert correlation in a cooperative intrusion detection framework – F Cuppens, A Mige - 2002
85 Intrusion Detection Systems & Multisensor Data Fusion: Creating Cyberspace Situational Awareness – Tim Bass - 2000
22 Techniques and Tools for Analyzing Intrusion Alerts – Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu - 2004
822 Snort - Lightweight Intrusion Detection for Networks – Martin Roesch, Stanford Telecommunications - 1999
62 A mission-impact-based approach to INFOSEC alarm correlation – Phillip A. Porras, Martin W. Fong, Alfonso Valdes - 2002
7 an open source network intrusion prevention and detection system,” 2008. [Online]. Available: http://www.snort.org – “Snort Sourcefire
80 An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection – Matthew V. Mahoney, Philip K. Chan - 2003
69 M2d2: A formal data model for ids alert correlation – Benjamin Morin, Ludovic Mé, Hervé Debar, Mireille Ducassé - 2002
112 STATL: An Attack Language for State-based Intrusion Detection – Steven Eckmann , Giovanni Vigna, Richard A. Kemmerer - 2002
85 NetSTAT: A Network-based Intrusion Detection Approach – Giovanni Vigna , Richard A. Kemmerer - 1998
686 Bro: A System for Detecting Network Intruders in Real-Time – Vern Paxson - 1999
200 Anomalous payload-based network intrusion detection – Ke Wang, Salvatore J. Stolfo - 2004
44 Enriching intrusion alerts through multi-host causality – Samuel T. King, Z. Morley Mao, Dominic G. Lucchetti, Peter M. Chen - 2005
30 Modeling Multistep Cyber Attacks for Scenario Recognition – Steven Cheung, Ulf Lindqvist, Martin W. Fong - 2003
4 Context-Based Intrusion Detection Using Snort, Nessus and Bugtraq Databases – Frederic Massicotte, Lionel C. Briand, Mathieu Couture, Yvan Labiche - 2005
9 Using vulnerability trees for decision making in threat assessment – S Vidalis, S Vidalis, A Jones, A Jones, Stilianos Vidalis, Andy Jones - 2003