<--- Back to Details
First PageDocument Content
Computing / Hacking / Software testing / Alert correlation / Attack / Alert messaging / Buffer overflow / Vulnerability / Denial-of-service attack / Cyberwarfare / Computer security / Computer network security
Date: 2011-11-09 13:26:18
Computing
Hacking
Software testing
Alert correlation
Attack
Alert messaging
Buffer overflow
Vulnerability
Denial-of-service attack
Cyberwarfare
Computer security
Computer network security

Techniques and Tools for Analyzing Intrusion Alerts PENG NING, YUN CUI, DOUGLAS S. REEVES, and DINGBANG XU North Carolina State University Traditional intrusion detection systems (IDSs) focus on low-level attacks or anom

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Download Document from Source Website

File Size: 571,13 KB

Share Document on Facebook

Similar Documents

‫رشح مقدمة يف‬  EggHunter Buffer Overflow for Windows Haboob-Team

‫رشح مقدمة يف‬ EggHunter Buffer Overflow for Windows Haboob-Team

DocID: 1uNRb - View Document

B u ffe r o ve rflo w A buffer overflow condition exists when a program attem pts to put m ore data in a buffer than it can hold or when a program attem pts to put data in a m em ory area past a buffer. In this case, a b

B u ffe r o ve rflo w A buffer overflow condition exists when a program attem pts to put m ore data in a buffer than it can hold or when a program attem pts to put data in a m em ory area past a buffer. In this case, a b

DocID: 1u6nA - View Document

A Dynamic Mechanism for Recovering from Buffer Overflow Attacks Stelios Sidiroglou, Giannis Giovanidis, and Angelos D. Keromytis Department of Computer Science, Columbia University, USA {stelios,ig2111,angelos}@cs.columb

A Dynamic Mechanism for Recovering from Buffer Overflow Attacks Stelios Sidiroglou, Giannis Giovanidis, and Angelos D. Keromytis Department of Computer Science, Columbia University, USA {stelios,ig2111,angelos}@cs.columb

DocID: 1tlja - View Document

Q: Exploit Hardening Made Easy  Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

DocID: 1rrtf - View Document

Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I

DocID: 1rlqR - View Document