Back to Results
First PageMeta Content
NP-complete problems / Morphisms / Alert correlation / Graph isomorphism / Subgraph isomorphism problem / Matching / Tree / Mathematics / Theoretical computer science / Graph theory


Learning Attack Strategies from Intrusion Alerts ∗ Peng Ning
Add to Reading List

Document Date: 2011-11-09 13:26:02


Open Document

File Size: 173,93 KB

Share Result on Facebook

City

Washington / DC / /

Company

T Research Labs / AT & T / G 3 / Microsoft Corporation / Internet Security Systems / /

Country

Switzerland / United States / /

Currency

USD / /

/

Facility

University of Bern / Prentice Hall / Computer Science North Carolina State University / /

IndustryTerm

security applications / apache web servers / WEB-IIS unicode exploits / graph matching tool / intrusion detection systems / WEB-IIS ISAPI .printer access / network-based applications / Internet Information Services / WEB-IIS unicode directory traversal attempt / potential applications / Internet Printing Protocol / intrusion alert correlation algorithm / sadmind services / attack strategy learning algorithm / image processing / web server / WEB-IIS cmd.exe access / search space / /

OperatingSystem

DoS / Windows 2000 / /

Organization

Peng Ning Dingbang Xu Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh / U.S. Army Research Office / National Science Foundation / Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh / MIT Lincoln Lab. / CERT Coordination Center / University of Bern / Pattern Analysis and Machine Intelligence / /

Person

Wc / Bruno T. Messmer / PING NMAP / Lincoln Lab / /

/

Position

formal data model for IDS alert correlation / Protection General / requires/provides model for computer attacks / Data Engineer / /

Product

GraphViz / Microsoft Corporation Portable Audio Device / Snort / Jaccard / Sonim XP1 Cellular Phone / /

ProgrammingLanguage

C / /

ProvinceOrState

North Carolina / /

PublishedMedium

The American Naturalist / /

Technology

ISAPI / UDP / html / Operating Systems / 0 Algorithm / image processing / Graph Matching Algorithms / attack strategy learning algorithm / DNS / artificial intelligence / underlying intrusion alert correlation algorithm / http / web server / /

URL

http /

SocialTag