Login / Signup
Using Cluster and Correlation to Construct Attack Scenarios.
Yugang Zhang
Shisong Xiao
Xin Zhuang
Xi Peng
Published in:
CW (2008)
Keyphrases
</>
alert correlation
attack scenarios
intrusion detection
intrusion detection system
clustering algorithm
attack detection
attack graph
data points
network security
data mining
rough sets
text classification
multistage