[1] |
VALEUR F , VIGNA G , KRUEGEL C , et al. A comprehensive ap-proach to intrusion detection alert correlation[J]. IEEE Transactions on Dependable and Secure Computing, 2004,1(3): 146-169.
|
[2] |
ROSCHKE S , CHENG F , MEINEL C . An alert correlation platform for memory-supported techniques[J]. Concurrency and Computa-tion-practice &Experience, 2012,24(10): 1123-1136.
|
[3] |
梅海彬, 龚俭, 张明华 . 基于警报序列聚类的多步攻击模式发现研究[J]. 通信学报, 2011,32(5): 63-69. MEI HB , GONG J , ZHANG MH . Research on discovering multi-step attack patterns based on clustering IDS alert sequences[J]. Journal on Communications, 2011,32(5): 63-69.
|
[4] |
ROSCHKE S , CHENG F , MEINEL C . Using vulnerability informa-tion and attack graphs for intrusion detection[A]. Information Assur-ance and Security (IAS),2010 Sixth International Conference on IEEE[C]. 2010.68-73.
|
[5] |
NOEL S , JAJODIA S . Advanced vulnerability analysis and intrusion detection through predictive attack graphs[A]. Critical Issues in C4I,Armed Forces Communications and Electronics Association (AFCEA) Solutions Series International Journal of Command and Control[C]. 2009.
|
[6] |
JAJODIA S , NOEL S . Topological Vulnerability Analysis[M]. Springer, 2010.139-154.
|
[7] |
OU X , BOYER W , MCQUEEN M . A scalable approach to attack graph generation[A]. ACM[C]. 2006.336-345.
|
[8] |
GONZALEZ J E , LOW Y , GU H , et al. PowerGraph:distributed graph-parallel computation on natural graphs[A]. OSDI[C]. 2012,12(1): 2.
|
[9] |
WANG L , LIU A , JAJODIA S . Using attack graphs for correlating,hypothesizing,and predicting intrusion alerts[J]. Computer Commu-nications, 2006,29(15): 2917-2933.
|
[10] |
AHMADINEJAD S H , JALILI S , ABADI M . A hybrid model for correlating alerts of known and unknown attack scenarios and up-dating attack graphs[J]. Computer Networks, 2011,55(9): 2221-2240.
|
[11] |
ROSCHKE S , CHENG F , MEINEL C . High-quality attack graph-based IDS correlation[J]. Logic Journal of the Igpl, 2013,21(4I): 571-591.
|
[12] |
ROSCHKE S , CHENG F , MEINEL C . A new alert correlation algo-rithm based on attack graph[J]. Computational Intelligence in Security for Information Systems, 2011,6694:58-67.
|
[13] |
DEAN J , GHEMAWAT S . MapReduce[J]. Communications of the ACM, 2008,51(1): 107.
|
[14] |
LOW Y , BICKSON D , GONZALEZ J , et al. Distributed graphlab:a framework for machine learning and data mining in the cloud[J]. Pro-ceedings of the VLDB Endowment, 2012,5(8): 716-727.
|
[15] |
MALEWICZ G , AUSTERN M H , BIK A J C , et al. Pregel:a system for large-scale graph processing[A]. Proceedings of the 2010 ACM SIGMOD International Conference on Management of data[C]. 2010.
|
[16] |
LI K , GIBSON C , HO D , et al. Assessment of machine learning algo-rithms in cloud computing frameworks[Z]. IEEE, 2013.98-103.
|
[17] |
GUO Y , BICZAK M , VARBANESCU A L , et al. Towards bench-marking graph-processing platforms[A]. The International Conference for High Performance Computing,Networking,Storage and Analy-sis[C]. 2013.
|
[18] |
CHING A , KUNZ C . Giraph:large-scale graph processing infrastruc-ture on Hadoop[J]. Hadoop Summit, 2011,29(6).
|
[19] |
LOW Y , GONZALEZ J , KYROLA A , et al. Graphlab:a new parallel framework for machine learning[A]. UAI[C]. 2010.340-349.
|
[20] |
OU X , GOVINDAVAJHALA S , APPEL A W . MulVAL:a logic- based network security analyzer[A]. 14th USENIX Security[C]. 2005.1-16.
|
[21] |
LOW Y . GraphLab:A Distributed Abstraction for Large Scale Ma-chine Learning[D]. University of California, 2013.
|