Back to Results
First PageMeta Content
Alert correlation / Alert messaging


Hypothesizing and Reasoning about Attacks Missed by Intrusion Detection Systems PENG NING and DINGBANG XU North Carolina State University Several alert correlation methods have been proposed over the past several years
Add to Reading List

Document Date: 2011-11-09 13:26:18


Open Document

File Size: 356,76 KB

Share Result on Facebook

Company

ACM Inc. / Invasive Software / Cyber Defense Laboratory / /

Currency

USD / /

/

Facility

North Carolina State University / Building Attack Scenarios / /

IndustryTerm

coordinated management / large networks / direct intruder management / data mining / sadmind remote administration tool / attack tools / networked information systems / copyright/server / information systems / vulnerable services / capable systems / intrusion response systems / automated attack tools / vulnerable systems / intrusion detection systems / model checking tools / /

Organization

CERT Coordinate Center / U.S. Army Research Office / National Science Foundation / North Carolina State University / /

Person

Lee / Qin / PING NMAP / /

Position

General / Protection General / /

Technology

data mining / UDP / Operating Systems / /

SocialTag