Alert correlation

Results: 28



#Item
11Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach ∗ Dingbang Xu and Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University {dxu,pning}@ncsu.edu

Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach ∗ Dingbang Xu and Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University {dxu,pning}@ncsu.edu

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:57
12Adapting Query Optimization Techniques for Efficient Intrusion Alert Correlation∗ Peng Ning and Dingbang Xu Department of Computer Science, North Carolina State University Raleigh, NC

Adapting Query Optimization Techniques for Efficient Intrusion Alert Correlation∗ Peng Ning and Dingbang Xu Department of Computer Science, North Carolina State University Raleigh, NC

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:06
13Integrating IDS Alert Correlation and OS-Level Dependency Tracking Yan Zhai, Peng Ning, Jun Xu North Carolina State University Abstract. Intrusion alert correlation techniques correlate alerts into meaningful groups or a

Integrating IDS Alert Correlation and OS-Level Dependency Tracking Yan Zhai, Peng Ning, Jun Xu North Carolina State University Abstract. Intrusion alert correlation techniques correlate alerts into meaningful groups or a

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:10
14Building Attack Scenarios through Integration of Complementary Alert Correlation Methods ∗ Peng Ning, Dingbang Xu, Christopher G. Healey, and Robert St. Amant Cyber Defense Laboratory Department of Computer Science Nor

Building Attack Scenarios through Integration of Complementary Alert Correlation Methods ∗ Peng Ning, Dingbang Xu, Christopher G. Healey, and Robert St. Amant Cyber Defense Laboratory Department of Computer Science Nor

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:13
    15Hypothesizing and Reasoning about Attacks Missed by Intrusion Detection Systems PENG NING and DINGBANG XU North Carolina State University  Several alert correlation methods have been proposed over the past several years

    Hypothesizing and Reasoning about Attacks Missed by Intrusion Detection Systems PENG NING and DINGBANG XU North Carolina State University Several alert correlation methods have been proposed over the past several years

    Add to Reading List

    Source URL: discovery.csc.ncsu.edu

    Language: English - Date: 2011-11-09 13:26:18
    16Learning Attack Strategies from Intrusion Alerts  ∗ Peng Ning

    Learning Attack Strategies from Intrusion Alerts ∗ Peng Ning

    Add to Reading List

    Source URL: discovery.csc.ncsu.edu

    Language: English - Date: 2011-11-09 13:26:02
    17Analyzing Intensive Intrusion Alerts Via Correlation Peng Ning, Yun Cui, and Douglas S. Reeves Department of Computer Science North Carolina State University Raleigh, NC , ,

    Analyzing Intensive Intrusion Alerts Via Correlation Peng Ning, Yun Cui, and Douglas S. Reeves Department of Computer Science North Carolina State University Raleigh, NC , ,

    Add to Reading List

    Source URL: discovery.csc.ncsu.edu

    Language: English - Date: 2011-11-09 13:26:14
    18

    PDF Document

    Add to Reading List

    Source URL: romisatriawahono.net

    Language: English - Date: 2013-01-23 01:11:11
    19Intrusion Detection Systems Correlation: a Weapon of Mass Investigation

    Intrusion Detection Systems Correlation: a Weapon of Mass Investigation

    Add to Reading List

    Source URL: cansecwest.com

    Language: English - Date: 2008-06-12 15:35:32
    20Improvements in Security Alert Analysis with a Truth Maintenance System

    Improvements in Security Alert Analysis with a Truth Maintenance System

    Add to Reading List

    Source URL: www.hicss.hawaii.edu

    Language: English - Date: 2007-11-29 01:14:03