|
[1] P. Ammann, D. Wijesekera and S. Kaushik, “ Scalable, graph-based network vulnerability analysis,” in Ninth ACM conference on computer and communications security, Washington, DC, 2002, pp. 217-224. [2] J. Arshad, P. Townend and J. Xu, “An Abstract Model for Integrated Intrusion Detection and Severity Analysis for Clouds ,” International Journal of Cloud Applications and Computing (IJCAC), vol. 1, no. 1, pp. 1-17, Jan., 2011. [3] S. Axelsson, “The base-rate fallacy and its implications for the difficulty of intrusion detection,” in 6th ACM conference on Computer and communications security, Singapore, 1999, pp. 1-7. [4] C. Clifton and G. Gengo, “Developing custom intrusion detection filters using data mining,” in 21st Century Military Communications Conference Proceedings, Los Angeles, CA, 2000, vol. 1, pp. 440 - 443. [5] P. Cox. (2010, March). Intrusion detection in a cloud computing environment [Online]. Available: http://searchcloudcomputing.techtarget.com/tip/Intrusion-detection-in-a-cloud-computing-environment [6] H. Debar, D. Curry and B. Feins. (2007, March). The Intrusion Detection Message Exchange Format (IDMEF) [Online]. Available: http://www.ietf.org/rfc/rfc4765.txt [7] T. Garfinkel and M. Rosenblum, “A Virtual Machine Introspection Based Architecture for Intrusion Detection,” in Network and Distributed System Security Symposium (NDSS), San Diego, CA, 2003, pp. 191-206. [8] C. W. Geib and R. P. Goldman, “Plan recognition in intrusion detection systems,” in DARPA Information Survivability Conference &; Exposition II (DISCEX '01), Anaheim, CA , 2001, vol. 1, pp. 46 - 55. [9] H. Hamad and M. Al-hoby, “Managing Intrusion Detection as a Service in Cloud Networks,” International Journal of Computer Application , vol. 41, no. 1, pp. 35-40, 2012. [10] K. Julisch, “Mining alarm clusters to improve alarm handling efficiency,” in 17th Annual Computer Security Applications Conference, New Orleans, LA, 2001, pp. 12-21. [11] S. Lagzian, F. Amiri, A. Enayati and H. Gharaee, “Frequent item set mining-based alert correlation for extracting multi-stage attack scenarios,” in Sixth International Symposium on Telecommunications (IST), Tehran, 2012, pp. 1010-1014.
[12] R. Lippmann, S. Webster and D. Stetson, “The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection,” in 5th International Symposium on Recent Advances in Intrusion Detection (RAID), Zurich , 2002, pp. 307-326. [13] M. Marchetti, M. Colajanni and F. Manganiello, “Identification of correlated network intrusion alerts,” in Third International Workshop on Cyberspace Safety and Security (CSS), Milan, 2011, pp. 15-20. [14] P. Mell and T. Grance. (2011, September). The NIST Definition of Cloud Computing [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf [15] C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel and M. Rajarajan, “A survey of intrusion detection techniques in Cloud,” Journal of Network and Computer Application, vol. 36, no. 1, pp. 42-57, Jan., 2013. [16] X. Qin. (2005, August). A Probabilistic-Based Framework for INFOSEC Alert Correlation [Online]. Available: https://smartech.gatech.edu/bitstream/handle/1853/7278/qin_xinzhou_200508_phd.pdf [17] S. Roschke, F. Cheng and C. Meinel, “An Extensible and Virtualization-Compatible IDS Management Architecture,” in Fifth International Conference on Information Assurance and Security, Xian, 2009, pp. 130-134. [18] K. Scarfone and P. Mell. (2012, July). Guide to Intrusion Detection and Prevention Systems (IDPS) (Draft) [Online]. Available: http://csrc.nist.gov/publications/drafts/800-94-rev1/draft_sp800-94-rev1.pdf [19] O. M. Sheyner. (2004, April 14). Scenario Graphs and Attack Graphs [Online]. Available: http://www.cs.cmu.edu/~scenariograph/sheynerthesis.pdf [20] A. Valdes and K. Skinner, “Probabilistic Alert Correlation,” in 4th International Symposium on Recent Advances in Intrusion Detection (RAID), Davis, CA, 2001, pp. 54-68. [21] K. Vieira, A. Schulter, C. B. Westphall and C. M. Westphall, “Intrusion Detection for Grid and Cloud Computing,” IEEE IT Professional Magazine, vol. 12, no. 4, pp. 38-43, Sep., 2010. [22] S. Zhang, J. Li, X. Chen and L. Fan, “Building network attack graph for alert causal correlation,” Computer &; Security, vol. 27, no. 5-6, pp. 188-196, Oct., 2008.
|