参考文献
|
-
MIT Lincoln Laboratory, 2000 Darpa Intrusion Detection Scenario Specific Data Sets, 2000. Available:http://www.ll.mit.edu/mission/communications/cyber/CSTcorpora/ideval/data/.http://www.ll.mit.edu/mission/communications/cyber/CSTcorpora/ideval/data/
-
Ahmadinejad, S. H.,Jalili, S.,Abadi, M.(2011).A Hybrid Model for Correlating Alerts of Known and Unknown Attack Scenarios and Updating Attack Graphs.International Journal of Computer and Telecommunications Networking,55(9),2221-2240.
-
Alserhani, F.,Akhlaq, M.,Awan, I. U,Cullen, A. J.(2010).MARS: Multi-stage Attack Recognition System.24th IEEE International Conference on Advanced Information Networking and Applications (AINA)
-
Artz, M.(2002).Massachusetts Institute of Technology.
-
Jajodia, S.,Noel, S.,O'Berry, B.(2005).Topological Analysis of Network Attack Vulnerability.Massive Computing,5,247-266.
-
Ou, X.,Boyer, W. F.,McQueen, M. A.(2006).A Scalable Approach to Attack Graph Generation.13th ACM conference on Computer and communications security
-
Ou, X.,Govindavajhala, S.,Appel, A. W.(2005).MulVAL: A Logic-based Network Security Analyzer.14th USENIX Security Symposium
-
Rao, P.,Sagonas, K. F.,Swift, T.,Warren, D. S.,Freire, J.(1997).XSB: A System for Efficiently Computing Well-founded Semantics.4th International Conference on Logic Programming and Non-Monotonic Reasoning (LPNMR'97)
-
Ren, H. L.,Stakhanova, N.,Ghorbani, A.(2010).An Online Adaptive Approach to Alert Correlation.Proc. 7th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
-
Wang, C. H.,Yang, J.M.(2013).Department of Computer Science and Information, Engineering National Chiayi University.
-
Wang, L.,Liu, A.,Jajodia, S.(2006).Using Attack Graphs for Correlating, Hypothesizing, and Predicting Intrusion Alerts.Computer Communications,29(15),2917-2933.
-
Zali, Z.,Hashemi, M. R.,Saidi, H.(2012).Real-Time Attack Scenario Detection via Intrusion Detection Alert Correlation.9th International ISC Conference on Information Security and Cryptology (ISCISC)
-
Zhang, S.,Li, J.,Chen, X.,Fan, L.(2008).Generating Network Attack Graphs for Security Alert Correlation.The 3rd International Conference on Communications and Networking
-
Zhu, B.,Ghorbani, A. A.(2006).Alert correlation for extracting attack strategies.International Journal of Network Security,3(3),244-258.
|