Back to Results
First PageMeta Content
Computing / Hacking / Software testing / Alert correlation / Attack / Alert messaging / Buffer overflow / Vulnerability / Denial-of-service attack / Cyberwarfare / Computer security / Computer network security


Techniques and Tools for Analyzing Intrusion Alerts PENG NING, YUN CUI, DOUGLAS S. REEVES, and DINGBANG XU North Carolina State University Traditional intrusion detection systems (IDSs) focus on low-level attacks or anom
Add to Reading List

Document Date: 2011-11-09 13:26:18


Open Document

File Size: 571,13 KB

Share Result on Facebook

Company

ACM Inc. / Cyber Defense Laboratory / /

Currency

USD / /

/

Facility

North Carolina State University / UDP port VictimPort / /

IndustryTerm

sadmind remote administration tool / analysis utilities / interactive utilities / vulnerable sadmind services / copyright/server / interactive analysis utilities / network management / vulnerable services / security management / intrusion response systems / data mining approach / intrusion detection systems / /

Organization

U.S. Army Research Office / National Science Foundation / MIT / North Carolina State University / /

Person

Colored-Petri Automata / DOUGLAS S. REEVES / Lincoln Lab / /

Position

CPA / Protection General / /

Technology

data mining / UDP / Operating Systems / firewall / /

SocialTag