Alert correlation

Results: 28



#Item
1Computing / Computer network security / Cyberwarfare / Computer security / Multi-agent systems / Spamming / Intrusion detection system / Malware / Computer virus / Botnet / Alert correlation / Infection

BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2007-06-29 16:14:13
2Computing / Computer security / Computer network security / Security engineering / Cyberwarfare / Intrusion detection system / System administration / Botnet / Computer virus / Malware / Alert correlation / Bro

BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

Add to Reading List

Source URL: faculty.cs.tamu.edu

Language: English - Date: 2007-05-15 01:33:26
3

Building Attack Scenarios through Integration of Complementary Alert Correlation Methods ∗ Peng Ning, Dingbang Xu, Christopher G. Healey, and Robert St. Amant Cyber Defense Laboratory Department of Computer Science Nor

Add to Reading List

Source URL: www.csc.ncsu.edu

Language: English - Date: 2015-07-12 13:03:46
    4Alert correlation

    Building Attack Scenarios through Integration of Complementary Alert Correlation Methods ∗ Peng Ning, Dingbang Xu, Christopher G. Healey, and Robert St. Amant Cyber Defense Laboratory Department of Computer Science Nor

    Add to Reading List

    Source URL: www.isoc.org

    Language: English - Date: 2004-11-17 13:32:34
      5Alert messaging / Cluster analysis / Attack patterns / Computer cluster / Computing / Statistics / Alert correlation

      Alert Correlation through Triggering Events and Common Resources ∗ Dingbang Xu and Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

      Add to Reading List

      Source URL: discovery.csc.ncsu.edu

      Language: English - Date: 2011-11-09 13:25:57
      6Computing / Hacking / Software testing / Alert correlation / Attack / Alert messaging / Buffer overflow / Vulnerability / Denial-of-service attack / Cyberwarfare / Computer security / Computer network security

      Techniques and Tools for Analyzing Intrusion Alerts PENG NING, YUN CUI, DOUGLAS S. REEVES, and DINGBANG XU North Carolina State University Traditional intrusion detection systems (IDSs) focus on low-level attacks or anom

      Add to Reading List

      Source URL: discovery.csc.ncsu.edu

      Language: English - Date: 2011-11-09 13:26:18
      7Computing / Intrusion detection system / Alert correlation / Thresh / Bayesian network / Snort / Intrusion detection system evasion techniques / Computer network security / Software / System software

      Reasoning about Complementary Intrusion Evidence∗ Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

      Add to Reading List

      Source URL: discovery.csc.ncsu.edu

      Language: English - Date: 2011-11-09 13:25:57
      8Theoretical computer science / Rough set / Attribute grammar / Alert messaging / Internet privacy / Privacy / Attribute / Lookup table / Computing / Computer programming / Ethics

      A Flexible Approach to Intrusion Alert Anonymization and Correlation Dingbang Xu and Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

      Add to Reading List

      Source URL: discovery.csc.ncsu.edu

      Language: English - Date: 2011-11-02 15:23:09
      9Denial-of-service attack / Computing / Computer network security / Alert correlation / Alert messaging

      Constructing Attack Scenarios through Correlation of Intrusion Alerts Peng Ning Yun Cui

      Add to Reading List

      Source URL: discovery.csc.ncsu.edu

      Language: English - Date: 2011-11-09 13:26:01
      10Alert correlation / Graph isomorphism / Graph / Degree / Subgraph isomorphism problem / Graph theory / Mathematics / Theoretical computer science

      Learning Attack Strategies from Intrusion Alerts∗ Peng Ning and Dingbang Xu Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

      Add to Reading List

      Source URL: discovery.csc.ncsu.edu

      Language: English - Date: 2011-11-09 13:26:01
      UPDATE