{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T16:25:31Z","timestamp":1732033531441,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1109\/isias.2010.5604041","type":"proceedings-article","created":{"date-parts":[[2010,10,19]],"date-time":"2010-10-19T14:59:49Z","timestamp":1287500389000},"page":"68-73","source":"Crossref","is-referenced-by-count":6,"title":["Using vulnerability information and attack graphs for intrusion detection"],"prefix":"10.1109","author":[{"given":"Sebastian","family":"Roschke","sequence":"first","affiliation":[]},{"given":"Feng","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Meinel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref33","article-title":"Security Focus Bugtraq"},{"year":"2010","key":"ref32"},{"year":"0","key":"ref31","article-title":"Open Vulnerability and Assessment Language&#x201D;, OVAL"},{"year":"0","key":"ref30","article-title":"Mitre Corporation: &#x201C;Common vulnerabilities and exposures"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1002\/cplx.20001","article-title":"Attack scenario graphs for computer network threat analysis and prediction","volume":"9","author":"hughes","year":"2004","journal-title":"Journal of Complexity"},{"key":"ref36","article-title":"Analysis of the NIST database towards the composition of vulnerabilities in attack scenarios","author":"franqueira","year":"2008","journal-title":"Technical Report TR-CTIT-08-08"},{"article-title":"A complete guide to the common vulnerability scoring system version 2.0","year":"0","author":"mell","key":"ref35"},{"year":"0","key":"ref34","article-title":"National Vulnerability Database"},{"year":"0","key":"ref10","article-title":"Common vulnerabilities and exposures"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/950191.950192"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2001.991518"},{"key":"ref13","first-page":"54","article-title":"Probabilistic alert correlation","author":"valdes","year":"0"},{"key":"ref14","first-page":"85","article-title":"Aggregation and correlation of intrusiondetection alerts","author":"debar","year":"0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/586143.586144"},{"article-title":"A Probabilistic-Based Framework for INFOSEC Alert Correlation","year":"2005","author":"qin","key":"ref16"},{"key":"ref17","first-page":"73","article-title":"Statistical causality analysis of infosec alert data","author":"qin","year":"0"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00138-9"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/11427995_18"},{"key":"ref28","first-page":"8","article-title":"A Logic-based Network Security Analyzer","author":"ou","year":"0"},{"year":"0","key":"ref4","article-title":"Snort IDS"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029225"},{"year":"0","key":"ref3","article-title":"Samhain IDS"},{"key":"ref6","article-title":"The Intrusion Detection Message Exchange Format, Internet Draft","author":"debar","year":"2004","journal-title":"Technical Report IETF Intrusion Detection Exchange Format Working Group"},{"year":"0","key":"ref29","article-title":"Open source vulnerability database"},{"year":"2005","key":"ref5","article-title":"Prelude IDS"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16342-5_24"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04474-8_18"},{"journal-title":"F-Secure Corporation","article-title":"F-Secure Linux Security","year":"2006","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1501434.1501479"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.09.007"},{"key":"ref20","article-title":"Building attack scenarios through integration of complementary alert correlation method","author":"ning","year":"2004","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89862-7_16"},{"key":"ref21","first-page":"95","article-title":"A mission-impact-based approach to infosec alarm correlation","author":"porras","year":"0"},{"key":"ref24","first-page":"246","article-title":"An Advanced IDS Management Architecture","volume":"51","author":"roschke","year":"2010","journal-title":"Journal of Information Assurance and Security"},{"key":"ref23","article-title":"Adapting Query Optimization Techniques for Efficient Intrusion Alert Correlation","author":"ning","year":"2002","journal-title":"Technical Report"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"ref25","article-title":"Attack Trees: Modeling Security Threats","author":"schneier","year":"1999","journal-title":"Dr Dobb s J"}],"event":{"name":"2010 Sixth International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2010,8,23]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2010,8,25]]}},"container-title":["2010 Sixth International Conference on Information Assurance and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5594714\/5604038\/05604041.pdf?arnumber=5604041","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T11:15:42Z","timestamp":1497870942000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5604041\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/isias.2010.5604041","relation":{},"subject":[],"published":{"date-parts":[[2010,8]]}}}