Back to Results
First PageMeta Content
Denial-of-service attack / Computing / Computer network security / Alert correlation / Alert messaging


Constructing Attack Scenarios through Correlation of Intrusion Alerts Peng Ning Yun Cui
Add to Reading List

Document Date: 2011-11-09 13:26:01


Open Document

File Size: 158,32 KB

Share Result on Facebook

City

Washington / DC / Washington / /

Company

T Research Labs / AT & T / Macmillan Technology Publishing / ISS Inc. / James P. Anderson Co. / /

Country

United States / /

Currency

USD / /

/

Facility

Computer Science NC State University / Fort Washington / We store / North Carolina State University / /

Holiday

Assumption / /

IndustryTerm

evaluation network / vulnerable sadmind services / data mining approach / intrusion detection systems / sadmind remote administration tool / vulnerable services / intrusion response systems / off-line tool / /

Organization

Intrusion Alerts Peng Ning Yun Cui Douglas S. Reeves Department of Computer Science NC State University Raleigh / NCSU Center for Advanced Computing & Communication / U.S. Army Research Office / National Science Foundation / Department of Computer Science / Department of Computer Science NC State University Raleigh / MIT Lincoln Lab. / North Carolina State University / /

Person

Douglas S. Reeves / Lincoln Lab / Yun Cui Douglas / /

/

Position

Prime Minister / Protection General / administrator / requires/provides model for computer attacks / /

ProgrammingLanguage

SQL / Java / /

ProvinceOrState

Pennsylvania / North Carolina / /

Technology

XML / Java / firewall / Database Management System / data mining / UDP / Operating Systems / DBMS / /

URL

http /

SocialTag