共 30 条
[1]
Abad C., Taylor J., Sengul C., Yurick W., Zhou Y., Rowe K.E., Log correlation for intrusion detection: A proof of concept, Proceedings of the 19th Annual Computer Security Applications Conference, pp. 255-265, (2003)
[2]
Barse E.L., Jonsson E., Extracting attack manifestations to determine log data requirements for intrusion detection, Proceedings - Annual Computer Security Applications Conference, ACSAC, pp. 158-167, (2004)
[3]
Chandola V., Banerjee A., Kumar V., Anomaly detection: A survey, ACM Computing Survey, 41, pp. 58-58, (2009)
[4]
Chimphlee W., Abdullah A.H., Sap M.N.M., Chimphlee S., Srinoy S., Unsupervised clustering methods for identifying rare events in anomaly detection, Proceedings of the 6th International Enformatika Conference, pp. 26-28, (2005)
[5]
Chuvakin A., Public Security Log Sharing Site, (2009)
[6]
Forte D.V., The 'ART' of log correlation: Part 1: Tools and techniques for correlating events and log files, Computer Fraud and Security, 2004, 6, pp. 7-11, (2004)
[7]
Fredrikson M., Christodorescu M., Giffin J., Jhas S., A declarative framework for intrusion analysis, Adv. Inform. Security, 46, pp. 179-200, (2010)
[8]
Gogoi P., Borah B., Bhattacharyya D.K., Anomaly detection analysis of intrusion data using supervised and unsupervised approach, J. Convergence Inform. Technol., 5, pp. 95-110, (2010)
[9]
Herrerias J., Gomez R., A log correlation model to support the evidence search process in a forensic investigation, Proceedings of the 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 31-42, (2007)
[10]
Jain A.K., Data clustering: 50 years beyond K-means, Pattern Recognition Lett., 31, pp. 651-666, (2010)