1![BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology](https://www.pdfsearch.io/img/55ceb5d5676366962555ca9db354554f.jpg) | Add to Reading ListSource URL: www.cyber-ta.orgLanguage: English - Date: 2007-06-29 16:14:13
|
---|
2![BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology](https://www.pdfsearch.io/img/9077c6bc5ecbbf303a4cd57439956bdf.jpg) | Add to Reading ListSource URL: faculty.cs.tamu.eduLanguage: English - Date: 2007-05-15 01:33:26
|
---|
3![Building Attack Scenarios through Integration of Complementary Alert Correlation Methods ∗ Peng Ning, Dingbang Xu, Christopher G. Healey, and Robert St. Amant Cyber Defense Laboratory Department of Computer Science Nor Building Attack Scenarios through Integration of Complementary Alert Correlation Methods ∗ Peng Ning, Dingbang Xu, Christopher G. Healey, and Robert St. Amant Cyber Defense Laboratory Department of Computer Science Nor](https://www.pdfsearch.io/img/4995db2036392a36714bd3ee48ed5b08.jpg) | Add to Reading ListSource URL: www.csc.ncsu.eduLanguage: English - Date: 2015-07-12 13:03:46
|
---|
4![Building Attack Scenarios through Integration of Complementary Alert Correlation Methods ∗ Peng Ning, Dingbang Xu, Christopher G. Healey, and Robert St. Amant Cyber Defense Laboratory Department of Computer Science Nor Building Attack Scenarios through Integration of Complementary Alert Correlation Methods ∗ Peng Ning, Dingbang Xu, Christopher G. Healey, and Robert St. Amant Cyber Defense Laboratory Department of Computer Science Nor](https://www.pdfsearch.io/img/5d9ccef23a7d4732e3f5a09b9771d693.jpg) | Add to Reading ListSource URL: www.isoc.orgLanguage: English - Date: 2004-11-17 13:32:34
|
---|
5![Alert Correlation through Triggering Events and Common Resources ∗ Dingbang Xu and Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC Alert Correlation through Triggering Events and Common Resources ∗ Dingbang Xu and Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC](https://www.pdfsearch.io/img/3362464fe6f78b118668476b8a416449.jpg) | Add to Reading ListSource URL: discovery.csc.ncsu.eduLanguage: English - Date: 2011-11-09 13:25:57
|
---|
6![Techniques and Tools for Analyzing Intrusion Alerts PENG NING, YUN CUI, DOUGLAS S. REEVES, and DINGBANG XU North Carolina State University Traditional intrusion detection systems (IDSs) focus on low-level attacks or anom Techniques and Tools for Analyzing Intrusion Alerts PENG NING, YUN CUI, DOUGLAS S. REEVES, and DINGBANG XU North Carolina State University Traditional intrusion detection systems (IDSs) focus on low-level attacks or anom](https://www.pdfsearch.io/img/5d8da0280af5a5b9fb6411066144b80f.jpg) | Add to Reading ListSource URL: discovery.csc.ncsu.eduLanguage: English - Date: 2011-11-09 13:26:18
|
---|
7![Reasoning about Complementary Intrusion Evidence∗ Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC Reasoning about Complementary Intrusion Evidence∗ Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC](https://www.pdfsearch.io/img/940143cdb943c134e51e9bbaa335a116.jpg) | Add to Reading ListSource URL: discovery.csc.ncsu.eduLanguage: English - Date: 2011-11-09 13:25:57
|
---|
8![A Flexible Approach to Intrusion Alert Anonymization and Correlation Dingbang Xu and Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC A Flexible Approach to Intrusion Alert Anonymization and Correlation Dingbang Xu and Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC](https://www.pdfsearch.io/img/f1eef26c538673be3ff8b4055f7ae0d6.jpg) | Add to Reading ListSource URL: discovery.csc.ncsu.eduLanguage: English - Date: 2011-11-02 15:23:09
|
---|
9![Constructing Attack Scenarios through Correlation of Intrusion Alerts Peng Ning Yun Cui Constructing Attack Scenarios through Correlation of Intrusion Alerts Peng Ning Yun Cui](https://www.pdfsearch.io/img/fb1aeb0d12c053b73a7fe9706c279b16.jpg) | Add to Reading ListSource URL: discovery.csc.ncsu.eduLanguage: English - Date: 2011-11-09 13:26:01
|
---|
10![Learning Attack Strategies from Intrusion Alerts∗ Peng Ning and Dingbang Xu Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC Learning Attack Strategies from Intrusion Alerts∗ Peng Ning and Dingbang Xu Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC](https://www.pdfsearch.io/img/e8a81da6600b4bf4915beda2f19f771f.jpg) | Add to Reading ListSource URL: discovery.csc.ncsu.eduLanguage: English - Date: 2011-11-09 13:26:01
|
---|