D. Burks, Security Onion Project (github.com/Security-Onion-Solu tions/security-onion, p.2016

B. Cheng and R. Tseng, A Context Adaptive Intrusion Detection System for MANET, Computer Communications, vol.34, issue.3, pp.310-318, 2011.
DOI : 10.1016/j.comcom.2010.06.015

F. Cuppens and A. Miege, Alert correlation in a cooperative intrusion detection framework, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.202-215, 2002.
DOI : 10.1109/SECPRI.2002.1004372

M. Ficco, Security event correlation approach for cloud computing, International Journal of High Performance Computing and Networking, vol.7, issue.3, pp.173-185, 2013.
DOI : 10.1504/IJHPCN.2013.056525

M. Hoque, M. Mukit, and M. Bikas, An Implementation of Intrusion Detection System Using Genetic Algorithm, International Journal of Network Security & Its Applications, vol.4, issue.2, pp.109-120, 2012.
DOI : 10.5121/ijnsa.2012.4208

A. Lemay, J. Fernandez, and S. Knight, An isolated virtual cluster for SCADA network security research, Proceedings of the First International Symposium for ICS and SCADA Cyber Security Research, pp.88-96, 2013.

S. Saad and I. Traore, Extracting Attack Scenarios Using Intrusion Semantics, Proceedings of the Fifth International Symposium on the Foundations and Practice of Security, pp.278-292, 2013.
DOI : 10.1007/978-3-642-37119-6_18

A. Sadighian, J. Fernandez, A. Lemay, and S. Zargar, ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework, Proceedings of the Sixth International Symposium on the Foundations and Practice of Security, pp.161-177, 2014.
DOI : 10.1007/978-3-319-05302-8_10

F. Valeur, G. Vigna, C. Kruegel, and R. Kemmerer, Comprehensive approach to intrusion detection alert correlation, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.3, pp.146-169, 2004.
DOI : 10.1109/TDSC.2004.21

T. Williams, The Purdue enterprise reference architecture, Computers in Industry, vol.24, issue.2-3, pp.141-158, 1994.
DOI : 10.1016/0166-3615(94)90017-5

R. Yusof, S. Selamat, and S. Sahib, Intrusion alert correlation technique analysis for heterogeneous log, International Journal of Computer Science and Network Security, vol.8, issue.9, pp.132-138, 2008.