Security Onion Project (github.com/Security-Onion-Solu tions/security-onion, p.2016 ,
A Context Adaptive Intrusion Detection System for MANET, Computer Communications, vol.34, issue.3, pp.310-318, 2011. ,
DOI : 10.1016/j.comcom.2010.06.015
Alert correlation in a cooperative intrusion detection framework, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.202-215, 2002. ,
DOI : 10.1109/SECPRI.2002.1004372
Security event correlation approach for cloud computing, International Journal of High Performance Computing and Networking, vol.7, issue.3, pp.173-185, 2013. ,
DOI : 10.1504/IJHPCN.2013.056525
An Implementation of Intrusion Detection System Using Genetic Algorithm, International Journal of Network Security & Its Applications, vol.4, issue.2, pp.109-120, 2012. ,
DOI : 10.5121/ijnsa.2012.4208
An isolated virtual cluster for SCADA network security research, Proceedings of the First International Symposium for ICS and SCADA Cyber Security Research, pp.88-96, 2013. ,
Extracting Attack Scenarios Using Intrusion Semantics, Proceedings of the Fifth International Symposium on the Foundations and Practice of Security, pp.278-292, 2013. ,
DOI : 10.1007/978-3-642-37119-6_18
ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework, Proceedings of the Sixth International Symposium on the Foundations and Practice of Security, pp.161-177, 2014. ,
DOI : 10.1007/978-3-319-05302-8_10
Comprehensive approach to intrusion detection alert correlation, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.3, pp.146-169, 2004. ,
DOI : 10.1109/TDSC.2004.21
The Purdue enterprise reference architecture, Computers in Industry, vol.24, issue.2-3, pp.141-158, 1994. ,
DOI : 10.1016/0166-3615(94)90017-5
Intrusion alert correlation technique analysis for heterogeneous log, International Journal of Computer Science and Network Security, vol.8, issue.9, pp.132-138, 2008. ,