參考文獻 |
中文參考文獻
[1] 劉美君,「一種利用彩色派翠網關聯警訊以重建多步驟攻擊的方法」,國立中央大學資訊管理學系碩士論文,2004。
[2] 官炳宏,「結合隱藏式馬可夫模型與彩色派翠網以關聯多步驟攻擊警訊之方法」,國立中央大學資訊管理學系碩士論文,2005。
[3] 黃志豪,「一個使用模組化方式來重建多步驟攻擊情境的方法」,國立中央大學資訊管理學系碩士論文,2006。
[4] 梁嘉鴻,「具隱私防護之關聯規則探勘研究」,朝陽科技大學資訊管理系碩士論文,2004。
[5] 陳肇勳,「序列樣式探勘的隱私權保護」,靜宜大學資訊管理學系碩士論文, 2005。
[6] 王恩慈,「於關聯規則探勘上隱藏敏感知識之新式演算法」,東華大學資訊工程學系碩士論文,2004。
[7] 陳威宇,「安全管理營運中心中警訊整合與關聯呈現之研究與實作」,國立成功大學電腦與通信工程研究所碩士論文,2005。
[8] 翁興國,「資訊安全營運中心之事件關聯處理的根本問題分析」,2004 網際網路安全工程研討會論文集,2004。
英文參考文獻
[9] Computer Security Institute, http://www.gocsi.com
[10] Honeynet project, http://www.honeynet.org
[11] U. Flegel, Privacy-Respecting Intrusion Detection, volume 35 in Advances in Information Security, 2007, Springer, New York, 325 pages, ISBN-10 0-387-34346-6, ISBN-13 978-0-387-34346-4, e-ISBN-13 978-0-387-68254.
[12] L. Sweeney. “k-anonymity: A model for protecting privacy.” International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 2002.
[13] Raymond Chi-Wing Wong et al., “(α,k)-Anonymity: An Enhanced-Anonymity Model for Privacy-Preserving Data Publishing”, KDD’06, August 20–23, 2006.
[14] Carlisle Adams, “A classification for privacy techniques”, university of ottawa law & technology journal, access from www.uoltj.ca/articles/vol3.1/2006.3.1.uoltj.Adams.35-52.pdf, 2006.
[15] L. Sweeney, “Achieving k-anonymity privacy protection using generalization and suppression.” International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 2002.
[16] Grigorios Loukides et al., “Capturing Data Usefulness and Privacy Protection in K-Anonymisation” SAC07, March 11-15, 2007.
[17] Jian Xu et al., “UtilityBased Anonymization for Privacy Preservation with Less Information Loss”, 12th ACM SIGKDD, 2006.
[18] C. C. Aggarwal, “On Privacy Preservation against Adversarial Data Mining”, conference on Knowledge discovery and data mining, 2006.
[19] Kristen LeFevre et al., “Mondrian Multidimensional K-Anonymity.”, 22nd International Conference on Data Engineering (ICDE'06), 2006.
[20] Siddharth Srivastava, “Privacy vs. Utility in Anonymized Data”, access from www.cs.umass.edu/~siddhart/Publications/privutil_kanon.pdf, 2005.
[21] Vassilios S. Verykios et al., “State-of-the-art in Privacy Preserving Data Mining”, SIGMOD, 2004.
[22] P. Porras et al., “Large-scale collection and sanitization of network security data: risks and challenges”, Proceedings of the 2006 workshop on New security paradigms, 2006.
[23] Brent R. Waters et al., “Building an Encrypted and Searchable Audit Log”, Proceedings of 11th Annual Network and Distributed System, 2004.
[24] Joachim Biskup et al., “Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection”, RAID 2000.
[25] Tim Bass, “Intrusion detection systems and multisensor data fusion” Communications of the ACM, 2000.
[26] Klaus Julisch, “Clustering Intrusion Detection Alarms to Support Root Cause Analysis”, ACM Transactions on Information and System Security (TISSEC), 2003.
[27] Ambareen Siraj et al., “Multi-Level Alert Clustering for Intrusion Detection Sensor Data”, Fuzzy Information Processing Society, 2005.
[28] Mathew, S. et al., “Real-time multistage attack awareness through enhanced intrusion alert clustering”, Military Communications Conference, 2005.
[29] S.S. Chen et al., “GrIDS-A Graph based Intrusion Detection System for Large Networks”, In National Information Computer Security Conference, Baltimore, MD, 1996.
[30] F. Cuppens, “Managing alerts in a multi-intrusion detection environment”. In Proceedings of the 17th Annual Computer Security Applications Conference, December 2001.
[31] H. Debar et al., “Aggregation and correlation of intrusion-detection alerts”, RAID, 2001.
[32] Oleg Sheyner et al., “Automated Generation and Analysis of Attack Graphs”, Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2002.
[33] Yu-Sung Wu et al., “Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS”, 19th Annual Computer Security Applications Conference December 8-12, 2003.
[34] P. Lincoln et al., "Privacy-Preserving Sharing and Correlation of Security Alerts", in 13th USENIX Security Symposium, 2004.
[35] S. Singh, et al., "The EarlyBird System for Real-time Detection of Unknown Worms.", UCSD Tech Report CS2003-0761, August 2003, access from http://www.cs.ucsd.edu/~susingh/
[36] S.J. Stolfo, “Worm and Attack Early Warning: Piercing Stealthy Reconnaissance”, IEEE Computer and Privacy, 2004.
[37] Cooperative Association for Internet Data Analysis, http://www.caida.org/home/
[38] Symantec DeepSight Threat Management System, https://tms.symantec.com/Default.aspx
[39] Distributed Intrusion Detection System, http://www.dshield.org/
[40] SANS Internet Storm Center, http://isc.sans.org/
[41] Steven Cheung et al., “Modeling Multistep Cyber Attacks for Scenario Recognition”, DARPA Information Survivability Conference and Exposition (DISCEX III), 2003.
[42] Peng Ning et al., "Constructing Attack Scenarios through Correlation of Intrusion Alerts", in Proceedings of the 9th ACM Conference on Computer & Communications Security, pages 245--254, November 2002.
[43] P. A. Porras, "Privacy-Enabled Global Threat Monitoring", In IEEE SECURITY & PRIVACY, 2006.
[44] Dingbang Xu et al., “A Flexible Approach to Intrusion Alert Anonymization and Correlation”, Securecomm and Workshops, 2006.
[45] Dingbang Xu et al., “Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach”, ACSAC 2005.
[46] Ke Wang et al., "Privacy-preserving payload-based correlation for accurate malicious traffic detection", In SIGCOMM Workshop on Large Scale Attack Defence , 2006.
[47] Ke Wang et al., "Anomalous Payload-based Network Intrusion Detection. In Symposium on Recent Advances in Intrusion Detection, Sophia Antipolis.", In RAID, Sept 2004.
[48] Ke Wang et al., "Anomalous Payload-based Worm Detection and Signature Generation. In Symposium on Recent Advances in Intrusion Detection.", In Proceedings of the Eighth International Symposium on Recent Advances in Intrusion Detection(RAID 2005), 2005.
[49] Ke Wang et al., "Anagram: A Content Anomaly Detector Resistant to Mimicry Attack.”, In Proceedings of the Nineth International Symposium on Recent Advances in Intrusion Detection(RAID 2006), 2006.
[50] F. Cuppens et al., “Alert Correlation in a Cooperative Intrusion Detection Framework”, IEEE Symposium on Research in Security and Privacy, 2002.
[51] F. Cuppens et al., “CRIM:An Approach to Correlate Alerts and Recognize Malicious Intentions”, the RTO IST Symposium on Real Time Intrusion Detection, held in Estoril, Portugal, published in RTO-MP-101, 2002. |