[1] Ning P, Cui Y, Reeves D S. Analyzing Intensive Intrusion Alerts via Correlation[C]//Proceedings of International Symposium on Recent Advances in Intrusion Detection. Stevenage: Springer Verlang, 2002: 74-94.
[2] Ning P, Cui Y, Reeves D S. Constructing Attack Scenarios through Correlation of Intrusion Alerts[C]//Proceedings of the 9th ACM Conference on Computer and Communications Security. Washington: ACM, 2002: 245-254.
[3] Ahmadinejad S H, Jalili S, Abadi M. A Hybrid Model for Correlating Alerts of Known and Unknown Attack Scenarios and Updating Attack Graphs[J]. Computer Networks, 2011, 55(9): 2221-2240.
[4] Ning P, Xu D, Healey C G, et al. Building Attack Scenarios through Integration of Complementary Alert Correlation Methods[C]//11th Annual Network and Distributed System Security Symposium. Stevenage: Springer, 2004: 97-111.
[5] Ning P, Xu D. Adapting Query Optimization Techniques for Efficient Intrusion Alert Correlation[R/OL]. [2013-05-19]. discovery.csc.ncsu.edu/~pning/pubs/footcorldation.pdf.
[6] Valeur F, Vigna G, Kruegel C, et al. A Comprehensive Approach to Intrusion Detection Alert Correlation[J]. IEEE Transactions on Dependable and Secure Computing, 2004, 1(3): 146-169.
[7] Wang L, Liu A, Jajodia S. Using Attack Graphs for Correlating, Hypothesizing, and Predicting Intrusion Alerts[J]. Journal of Computer Communications, 2006, 29(15): 2917-2933.
[8] Zali Z, Hashemi M R, Saidi H. Real-Time Attack Scenario Detection via Intrusion Detection Alert Correlation[C]//Proceedings of the 9th International ISC Conference on Information Security and Cryptology. Piscataway: IEEE, 2012: 95-102.
[9] 杨洁, 刘聪锋. 模式匹配与校验和相结合的IP协议识别方法 [J]. 西安电子科技大学学报, 2012, 39(3): 149-153.
Yang Jie, Liu Congfeng. IP Protocol Identification Method Using the Pattern Match and Check Sum [J]. Journal of Xidian University, 2012, 39(3): 149-153.
[10] 林晖, 马建峰. 无线 Mesh网络中基于跨层信誉机制的安全路由协议 [J]. 西安电子科技大学学报, 2014, 41(1): 145-153.
Lin Hui, Ma Jianfeng. Cross Layer Reputation Mechanism based Secure Routing Protocol for WMNs [J]. Journal of Xidian University, 2014, 41(1): 145-153. |