1 |
D. Schnackenberg, K. Djahandari, and D. Sterne, 'Infrastructure for Intrusion Detection and Response,' Proceedings of the DARPA Information Survivability Conference and Exposition, Hilton Head, SC, January 2000
|
2 |
A. Valdes and K. Skinner, 'Probabilistic Alert Correlation', LNCS 2212, pp. 54-68, 2001
|
3 |
P. Ning, Y. Cui, and D. S. Reeves, 'Analyzing Intensive Intrusion Alerts Via Correlation', LNCS 2516, pp. 74-94, 2002
|
4 |
Stefan Axelsson, Intrusion Detection Systems: A Survey and Taxonomy, Technical report 99-15, Chalmers University of Technology, Sweden, March 2000
|
5 |
CERT Advisory CA-2003-04, MS-SQL Server Worm, http://www.cert.org/advisories/ CA-2003-04.html
|
6 |
H. Debar and A. Wespi, 'Aggregation and Correlation of Intrusion-Detection Alerts', LNCS 2212, pp. 85-103, 2001
|
7 |
SQL Slammer Worm, Internet Traffic Report, http://www.internettrafficreport.com/ event/3.htm
|
8 |
David C. Luckham and Brian Frasca, Complex Event Processing in Distributed Systems, Stanford University Technical Report CSL-TR-98-754, March 1998
|
9 |
P. A. Porras and P. G. Newmann, 'EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances,' Proceedings of the 20th NIS Security Conference, October 1997
|
10 |
David Moore, Vern Paxson, Stefan Savage, http://www.caida.org/outreach/ papers/ 2003/sapphire/sapphire.html, CAIDA Technical Report, 2003
|
11 |
H. Kim, J. Kim, S. Bahk, and I. Kang, 'Fast Classification, Calibration, and Visualization of Network Attacks on Backbone Links,' International Conference on Information Networking(ICOIN), 2004
|
12 |
S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip, D. Zerkle, 'GrIDS A Graph-based Intrusion Detection System for Large Networks,' Proceedings of the 19thNational Information Systems Security Conference, October 1996
|
13 |
H. Kim, 'Internet Traffic Control with reference to the Internet blackout of January 2003,' NETSEC-KR (Network Security Workshop Korea), 2003
|