|
[Ales01]D. Alessandri (Ed.), Towards a Taxonomy of Intrusion Detection Systems and Attacks. Deliverable D3, Project MAFTIA IST-1999-11583, Research Report, RZ 3366, IBM Zurich Laboratory, also available at http://www.MAFTIA.org, 2001.
[Ande02]D. Andersson, M. Fong, and A. Valdes, “Heterogeneous Sensor Correlation: A Case Study of Live Traffic Analysis,” Proc. of IEEE Information Assurance Workshop, United States Military Academy, West Point, NY, June 2002.
[Axel00]S. Axelsson, Intrusion Detection Systems: A Taxomomy and Survey. Technical Report 99-15, Dept. of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden, March 2000.
[Capo00]J. Capoulade, P. Carle, E. Cochevelou, F. Cuppens, M. Diop, S. Dubus, S. Gombault, L. Mé, C. Michel, B. Morin, “Mirador: A cooperative approach of IDS”, 6th European Symposium on Research in Computer Security (ESORICS), Toulouse, France, October 2000.
[Cupp00]F. Cuppens, “LAMBDA: A Language to Model a Database for Detection of Attacks,” Proc. of the Third International Workshop on the Recent Advances in Intrusion Detection (RAID’2000), Toulouse, France, October 2001.
[Cupp01]F. Cuppens, “Managing Alerts in Multi-Intrusion Detection Environments,” Proc. of 17th Annual Computer Security Applications Conference (ACSAC), pp. 22-31, New Orleans, Louisiana, 2001.
[Cupp02]F. Cuppens and A. Miege, “Alert Correlation in a Cooperative Intrusion Detection Framework,” Proc. of 2002 IEEE Symposium on Security and Privacy, pp. 202-215, Oakland, CA, 2002.
[Chang05]E. X. Chang, “An AutomaticAattack Plan Construction Technique for Attack Correlation and Prediction”, Master Thesis, Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taiwan, ROC, 2005.
[Deba00]H. Debar, M. Dacier, and A. Wespi, “A Revised Taxonomy for Intrusion-Detection Systems,” Annales des Télécommunications, Vol. 55, No. 7/8, pp. 361-378, 2000.
[Deba01]H. Debar and A. Wespi, “Aggregation and Correlation of Intrusion-Detection Alerts,” Proc. of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001), LNCS (Lecture Notes In Computer Science), Vol. 2212, Springer-Verlag, pp. 85-103, Davis, CA, USA, October 2001.
[Expe]eXpert-BSM, available at http://www.sdl.sri.com/projects/emerald/releases/eXpert-BSM/
[Grub93]T. R. Gruber, “A Translation Approach to Portable Ontology Specifications,” Knowledge Acquisition, Vol. 5, No. 2, pp. 199-220, 1993.
[ICAT]ICAT database, http://icat.nist.gov/icat.cfm
[Lind01]U. Lindqvist and P. Porras, “eXpert-BSM: A Host-based Intrusion Detection Solution for Sun Solaris,” Proc. of 17th Annual Computer Security Applications Conference (ACSAC), pp. 240-251, New Orleans, Louisiana, 2001.
[MIT99]MIT Lincoln Lab Intrusion Detection Attacks Database, available at http://www.ll.mit.edu/IST/ideval/docs/1999/attackDB.html
[MIT00]2000 DARPA Intrusion Detection Scenario Specific Data Sets, available at http://www.ll.mit.edu/IST/ideval/data/2000/2000_data_index.html
[Mori02]B. Morin, L. M, H. Debar, and M. Ducass, “M2D2:a Formal Data Model for IDS Alert Correlation,” Proc. of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), LNCS (Lecture Notes In Computer Science), Vol. 2516, Zurich, Switzerland, pp. 115-137, October 2002.
[Ning04]P. Ning, Y. Cui, D. S. Reeves, and D. Xu, “Tools and Techniques for Analyzing Intrusion Alerts,” ACM Transactions on Information and System Security, Vol. 7, No. 2, pp. 214-318, May 2004.
[Porr02]P. A. Porras, M. W. Fong and A. Valdes, “A Mission-Impact-based Approach to INFOSEC Alarm Correlation,” Proc. of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), LNCS (Lecture Notes In Computer Science), Vol. 2516, pp. 95-114, Springer-Verlag, 2001.
[Prot]Protégé, available at http://protege.stanford.edu/
[Real]RealSecure Network Sensor, available at http://www.iss.net/
[Roes99]M. Roesch, “Snort - lightweight intrusion detection for networks,” Proc. of LISA'99: 13th Systems Administration Conference, pp. 229-238, Seattle, Washington, November 1999.
[Snor]Snort, available at http://www.snort.org/
[Vald00]A. Valdes and K. Skinner, “Adaptive, Model-Based Monitoring for Cyber Attack Detection,” Proc. of the 3th International Symposium on Recent Advances in Intrusion Detection (RAID 2000), LNCS (Lecture Notes In Computer Science), Vol. 1907, Springer-Verlag, pp. 80-92, October 2000.
[Vald01]A. Valdes and K. Skinner, “Probabilistic alert correlation,” Proc. of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID 2001), LNCS (Lecture Notes In Computer Science), Vol. 2212, Springer-Verlag, pp. 54-68, Davis, CA, USA, 2001.
[Vign96]G. Vigna, “A Topological Characterization of TCP/IP Security,” Proc. of the 12th International FME Symposium, LNCS (Lecture Notes In Computer Science), Vol. 2805, Springer-Verlag, pp. 914-940, Pisa, Italy, September 2003.
[Yu04]C. Y. Yu, “A Primitive Attack-based New Correlation Technique for Heterogeneous Intrusion Alert-Construction and Detection of Primitive Attack”, Master Thesis, Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taiwan, ROC, 2004.
|