Sign in

Constructing attack scenarios through correlation of intrusion alerts.

Peng NingYun CuiDouglas S. Reeves
Published in: CCS (2002)
Keyphrases
  • alert correlation
  • attack scenarios
  • intrusion detection
  • intrusion detection system
  • attack graph
  • network security
  • attack graphs
  • lightweight
  • computer networks
  • real world
  • data analysis
  • network traffic
  • cyber security