Architecture for Near Real-Time Threat Assessment Using IDS Data.

作者: Grigorios Fragkos , Andrew Blyth

DOI:

关键词:

摘要:

参考文章(14)
Kymie M. C. Tan, Kevin S. Killourhy, Roy A. Maxion, Undermining an anomaly-based intrusion detection system using common exploits recent advances in intrusion detection. pp. 54- 73 ,(2002) , 10.1007/3-540-36084-0_4
R. Heady, G. Luger, A. Maccabe, M. Servilla, The architecture of a network level intrusion detection system Other Information: PBD: 15 Aug 1990. ,(1990) , 10.2172/425295
Hervé Debar, Andreas Wespi, Aggregation and Correlation of Intrusion-Detection Alerts recent advances in intrusion detection. pp. 85- 103 ,(2001) , 10.1007/3-540-45474-8_6
Anup K. Ghosh, Christoph Michael, Michael Schatz, A Real-Time Intrusion Detection System Based on Learning Program Behavior recent advances in intrusion detection. pp. 93- 109 ,(2000) , 10.1007/3-540-39945-3_7
Stephen Northcutt, Judy Novak, Network Intrusion Detection ,(1999)
Wenke Lee, Rahul A. Nimbalkar, Kam K. Yee, Sunil B. Patil, Pragneshkumar H. Desai, Thuan T. Tran, Salvatore J. Stolfo, A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions recent advances in intrusion detection. pp. 49- 65 ,(2000) , 10.1007/3-540-39945-3_4
Yinglian Xie, Hyang-Ah Kim, David R. O’Hallaron, Michael K. Reiter, Hui Zhang, Seurat: A Pointillist Approach to Anomaly Detection recent advances in intrusion detection. pp. 238- 257 ,(2004) , 10.1007/978-3-540-30143-1_13
Peng Ning, Yun Cui, Douglas S. Reeves, Analyzing intensive intrusion alerts via correlation recent advances in intrusion detection. pp. 74- 94 ,(2002) , 10.1007/3-540-36084-0_5
William Gropp, Ewing Lusk, Thomas Sterling, Beowulf Cluster Computing with Linux ,(2003)
Prem Uppuluri, R. Sekar, Experiences with Specification-Based Intrusion Detection recent advances in intrusion detection. pp. 172- 189 ,(2001) , 10.1007/3-540-45474-8_11