attack plan recognition using markov model

Publish Year: 1389
نوع سند: مقاله کنفرانسی
زبان: English
View: 2,064

This Paper With 8 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ISCC07_011

تاریخ نمایه سازی: 11 آذر 1389

Abstract:

While intrusion detection systems IDSs are widely used , large number of alerts as well as high rate of false positive events make such a security mechanism insufficient , accordingly a track of recent security research, focused on alert correlation. this paper proposes a markov model MM based correlation method of intrusion alerts which have been fired from different IDS sensors across an enterprise.

Authors

hamid farhadi

department of information technology

rasool jalili

network security center sharif university of technology tehran

mohammad khansari

department of information technology

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • S. Northcutt, Network intrusion detection: an analyst's handbook, New Riders ...
  • W. Lee and S.J. Stolfo, Data mining approaches for intrusion ...
  • V. Chandola, A. Banerjee, and V. Kumar, "Anomaly detection: A ...
  • revised A؛ه [4] H. Debar, M. Dacier, and A. Wespi, ...
  • T. Bass, "Intrusion detection systems and multisensor data fusion, " ...
  • X. Qin and W. Lee, "Attack plan recognition and prediction ...
  • F. Cuppens, "Managing alerts in a multi-intrusion detection environment, " ...
  • F. Valeur, G. Vigna, C. Kruegel, and R.A. Kemmerer, _ ...
  • A. Ehrenfeucht and J. Mycielski, _ Pseudorandom Sequence-How Random Is ...
  • W. Lee and X. Qin, "Statistical causality analysis of infosec ...
  • Z. Ning and J. Gong, _ Intrusion Plan Recognition Algorithm ...
  • D.S. Fava, S.R. Byers, and S.J. Yang, "Projecting Cyberattcks Through ...
  • _ ISCISC, September 15-16, 2010. K.N.Toosi University Of Technoligy ...
  • S.O. Al-Mamory and H. Zhang, "IDS alerts correlation using grammar-based ...
  • D. Curry, H. Debar, and B. Feinstein, "Intrusion detection message ...
  • T. Bray, J. Paoli, C.M. Sp erb erg-McQueen, E. Maler, ...
  • US Department of Homeland Security, "Common Vulnerabilities and Exposures (CVE), ...
  • SecurityFocus, "BugTraq Mailing List, " 2009. ...
  • P. Mell, K. Scarfone, and S. Romanosky, "Common vulnerability scoring ...
  • Response Center Security Bulletin Severity Rating System, " 2002. ...
  • P. Ning, TIAA: A Toolkit for Intrusion Alert Analysis, 2002. ...
  • "IBM Internet Security Systems, RealSecure Signature Reference Guide, " 2009. ...
  • J.M. Frangois, "Jahmm v0. 6.1, " 2006. ...
  • نمایش کامل مراجع