|
[1] Ofir Arkin and Fyodor Yarochkin, “Xprobe v2.0: A Fuzzy Approach to Remote Active Operating System Fingerprinting,” 2002 [2] Andre Arnes, Fredrik Valeur, Giovanni Vigna and R.A Kemmerer, “Using Hidden Markov Models to Evaluate the Risks of Intrusions,” Recent Advances in Intrusion Detection (RAID) Workshop, On page(s):145-164, 2006. [3] Andre Arnes, Karin Sallhammar, Kjetil Haslum, Tonnes Brekne, Marie Elisabeth Gaup Moe and Svein Johan Knapskog, “Real-Time Risk Assessment with Network Sensors and Intrusion Detection Systems,” International Conference on Computational Intelligence and Security (CIS), 2005. [4] Cacti, “Cacti: the complete rrdtool-based graphing solutions,” http://www.cacti.net [5] C.H. Chen “Building an Attack Scenario Database with Causal Relationship of Intrusive Behaviors in Unix- like Systems and its Applications,” NCKU, 2007 [6] Yu Chen, Kai Hwang and Wei-Shinn Ku, “Collaborative Detection of DDoS Attacks over Multiple Network Domains,” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, On page(s): 1649-662, 2007. [7] Y.C. Cheng, C.H. Chen, C.C. Chiang, J.W. Wang, C.S. Laih, “Generating Attack Scenarios with Causal Relationship,” IEEE International Conference on Granular Computing (GRC 2007), On page(s): 368-373, Nov. 02-04, 2007. [8] W.Y. Chen “The Study and Implementation of Alert Integration, Correlation, and Presentation System In SOC,” NCKU, 2006. [9] Steven Cheung, Ulf Lindqvist and Martin W.Fong, “Modeling Multistep Cyber Attacks for Scenario Recognition,” Proceedings of the Third DARPA Information Survivability Conference and Exposition, On page(s): 284-292 Vol.1, 2003. [10] C.C. Chiang “Building an Attack Scenario Database with Causal Relationship of Worm Attack Behaviors and its Applications,” NCKU, 2007 [11] Cisco, “Cisco PIX 506E Firewall Quick Start Guide,” http://www.conticomp.com/ [12] Frederic Cuppens and Alexandre Miege, “Alert Correlation in a Cooperative Intrusion Detection Framework,” Proceedings of the 2002 IEEE Symposium on Security and Privacy, On page(s): 202- 215, 2002. [13] Frederic Cuppens and Rodolphe Ortalo, “LAMBDA: A Language to Model a Database for Detection of Attacks,” Recent Advances in Intrusion Detection (RAID) Workshop, On page(s): 197-216, 2000. [14] D. Curry and H. Debar, “Intrusion Detection Message Exchange Format: Data Model and Extensible Markup Language (XML) Document Type Definition,” Intrusion DetectionWorking Group, June 20, 2002. Work in progress, IETF Internet-Draft draft-ietf-idwg- idmef- xml-07.txt [15] Kristopher Daley, Ryan Larson and Jerald Dawkins, “A Structure Framework for Modeling Multi-Stage Network Attack,” Proceedings of the International Conference on Parallel Processing Workshops, On page(s): 5-10, 2002. [16] Christos Douligeris and Aikaterini Mitrokotsa, “DDOS ATTACKS AND DEFENSE MECHANISMS: A CLASSIFICATION,” Proceedings of the 3rd IEEE International Symposium on Signal Processing and Information Technology, On page(s): 190-193, 2003. [17] Christos Douligeris and Aikaterini Mitrokotsa, “DDoS attacks and defense mechanisms: classification and state-of-the-art,” Computer Networks, On page(s): 643-666, 2004. [18] Ashish Gehani and Gershon Kedem, “RheoStat: Real- time Risk Management,” Recent Advances in Intrusion Detection (RAID), On page(s): 296-314, 2004. [19] Kjetil Haslum and Andre Arnes, “Multisensor Real- time Risk Assessment using Continuous-time Hidden Markov Models,” International Conference on Computational Intelligence and Security, On page(s): 1536-1540, 2006. [20] Honeypot, “Developments of the Honeyd Virtual Honeypot,” http://www.honeyd.org [21] Honeypot, “Intrusion Detection, Honeypots,” http://www.Honeypots.net [22] Yen-Hung Hu, Hongsik Choi, Hyeong-Ah Choi, “Packet Filtering to Defend Flooding-Based DDoS Attacks,” IEEE/Sarnoff Symposium on Advances in Wired and Wireless Communication, On page(s): 39- 42, 2004. [23] Zhou J., Heckman M., Reynolds B., Carison A., and Bishop M., “Modeling Network Intrusion Detection Alert for Correlation,” ACM transaction on Information and System Security, Vol.10, No.1, 2007. [24] A. Kuehlmann, K. L. McMilan, and R. K. Brayton. “Probabilistic state space search,” In Proceedings of ACM/IEEE international conference on Computer Aided Design, 1999. [25] Zhi-tang Li, Jie Lei, Li Wang and Dong Li, “Assessing Attack Threat by the Probability of Following Attacks,” International Conference on Networking, Architecture, and Storage (NAS), On page (s): 91-100, 2007. [26] Wang Li, Li Zhi-tang Wang Qi-hong, “A novel technique of recognizing multi-stage attack behaviour,” Signal Processing and Its Applications, On page(s): 188-193, 2003. Proceedings. Seventh International Symposium on. [27] Lersak Limwiwatkul and Arnon Rungsawangr, “Distributed Denial of Service Detection using TCP/IP Header and Traffic Measurement Analysis,” lntanational Syinposium on Communications and Information Technologies, On page(s): 605- 610, Vol.1, 2004. [28] Wei Lu and Issa Traore, “An Unsupervised Approach For Detecting DDOS Attacks Based On Traffic-Based Metrics,” IEEE Pacific Rim Conference on Communications, Computers and signal Processing, On page(s): 462- 465, 2005. [29] McAfee Avert Labs, “Top 10 Threat Predictions for 2007,” 2006. [30] McAfee Avert Labs, “Top 10 Threat Predictions for 2008,” 2007. [31] Vaibhav Mehta, Constantinos Bartzis, Haifeng Zhu, “Ranking Attack Graphs,” Recent Advances in Intrusion Detection (RAID) Workshop, On page(s): 127- 144 2006. [32] Microsoft, “Windows XP Security Guide,” http://www.microsoft.com/technet/security/prodtech /windowsxp/secwinxp/ [33] MIT Lincoln Lab, “2000 DARPA intrusion detection scenario specific datasets,” http://www.ll.mit.edu/mission/communications/ist /corpora/ideval/data/2000data.html [34] HD Moore, Jay Beale, Haroon Meer, Roelof Temmingh, Charl Van Der Walt and Renaud Deraison, “Nessus Network Auditing,” 2005 [35] MRTG, “MRTG,” http://oss.oetiker.ch/mrtg/ [36] Peng Ning, Yun Cui and Douoglas S. Reeves “Constructing Attack Scenarios through Correlation of Intrusion Alerts,” ACM Conference on Computer and Communicaiton Security (CCS), On page(s): 245-254, 2002 [37] Peng Ning, Dingban Xu, Christopher G. Healey and Robert St.Amant “Building Attack Scenarios through Integration of Complementary Alert Correlation Methods,” IEEE Workshop on Information Assurance and Security, On page(s): 97-111, 2001. [38] Nmap, “nmap,” http://nmap.org/ [39] Ntop, “ntop,” http://www.ntop.org [40] Phillip A. Porras, Martin W. Fong, and A. Valdes, “A Mission-Impact-Based Approach to INFOSEC Alarm Correlation,” Recent Advances in Intrusion Detection (RAID), On page(s): 95-114, 2002. [41] PRTG, “PRTG,” http://www.paessler.com/prtg [42] Xinzhou Qin and Wenke Lee, “Attack Plan Recognition and Prediction Using Causal Networks,” Computer Security Applications Conference, On page(s): 370- 379, 2004. [43] Yuji Soejima, Eric Y.Chen and Hitoshi Fuji, “Detecting DDoS Attacks by analyzing Client Response Patterns,” Proceedings of the 2005 Symposium on Applications and the Internet Workshops, On page(s): 98 - 101. [44] S. Staniford, J. Hoagland and J. McAlerney, “Practical automated detection of stealthy portscans.” To appear in Journal of Computer Security, 2002. [45] Symantec, “Internet Security Threat Report, Volume XI,” 2007. [46] Steven J. Templeton and Karl Levitt, “A Requires/Provides Model for Computer Attacks,” In Proceedings of New Security Paradigms workshop. ACM Press, On page(s): 31-38, 2000. [47] The Honeynet Project, “Know Your Enemy: Sebek,” 2003 [48] The Snort Project, “Snort Users Manual 2.6.1,” 2007. [49] T. Tidwell, R. Larson, K. Fitch and J. Hale, “Modeling Internet Attacks,” Proceedings of the IEEE Workshop on Information Assurance and Security, On page(s): 54–59, 2001. [50] Trend Micro, “Trend Micro threat report and forecast,” 2007. [51] Tripwire, “Tripwire changing monitoring and reporting solutions,” http://www.tripwire.com. [52] Valdes and K. Skinner, “Probabilistic alert correlation.” In Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID), Oct. 2001. [53] Y.M Wang, Z.L Liu, X.Y Cheng and K.J Zhang, “AN ANALYSIS APPROACH FOR MULTI-STAGE NETWORK ATTACKS,” Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, On page(s): 3949- 3954, Vol. 7, 2005. [54] Dingbang Xu and Peng Ning “Alert Correlation through Trigger Events and Common Resource,” Annual Computer Security Applications Conference, On page(s): 360- 369, 2004.
|