|
[1]曾龍, 李崇誠, 黃培軒, 鄭郁翰, 黃悅民 "Detection of Malware Attack via IDS Proxy Correlation Algorithm", U-Home Conference 2008 [2]賽門鐵克網路安全威脅研究報告,2008/04 [3]A. Valdes and K. Skinner. Probabilistic Alert Correlation. In Recent Advances in Intrusion Detection. Volume 2212 of Lecture Notes in Computer Science, Springer-Verlag, 2001. [4]Bro, http://bro-ids.org/ [5]C. Abad, J. Taylor, C. Sengul, Y. Zhou, W. Yurcik, and K. Rowe. Log Correlation for Intrusion Detection: A Proof of Concept. In Proc. of the 19th Annual Computer Security Applications Conference, Las Vegas, Nevada, USA, December 2003. [6]D. Andersson, M. Fong, and A. Valdes. Heterogeneous Sensor Correlation: A Case Study of Live Traffic Analysis. Presented at IEEE Information Assurance Workshop, June 2002. [7]F. Cuppens and A. Miege. Alert Correlation in a Cooperative Intrusion Detection Framework. In IEEE Symposium on Security and Privacy, May 2002. [8]Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee, "BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation", in Proceedings of the 16th USENIX Security Symposium, August 2007. [9]Iptables,http://www.netfilter.org/ [10]RFC3164 - The BSD Syslog Protocol [11]Snort, http://www.snort.org/ [12]Squid,http://www.squid-cache.org/ [13]X. Qin and W. Lee. Statistical Causality Analysis of INFOSEC Alert Data. In Recent Advances in Intrusion Detection, September 2002. [14]Yinglian Xie, "A Spatiotemporal Event Correlation Approach to Computer Security" Thesis of Ph.D. August 2005 [15]Yousof Al-Hammadi and Uwe Aickelin, "Detecting Botnets Through Log Correlation", IEEE / IST Workshop on "Monitoring, Attack Detection and Mitigation" Thursday 28 / Friday 29 September, 2006. [16]Yousof Al-Hammadi, Uwe Aickelin, “Detecting Bots Based on Keylogging Activities”, 3rd International Conference on Availability, Reliability and Security (ARES2008)
|