Information systems produce continuously a large amount of messages and alerts. In order to manage this amount of data, correlation system are introduced to reduce the alerts number and produce high-level meta-alerts with relevant information for the administrators. However, it is usually difficult to write complete and correct correlation rules and to maintain them. This thesis describes a method to create correlation rules from an attack scenario specified in a high-level language. This method relies on a specific knowledge base that includes relevant information on the system such as nodes or the deployment of sensor. This process is composed of different steps that iteratively transform an attack tree into a correlation rule. The assess...
International audienceInformation systems are prone to attacks. Those attacks can take different for...
International audienceIn distributed systems and in particular in industrial SCADA environments, ale...
International audienceInformation systems are prone to attacks. Those attacks can take different for...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
Dans les systèmes d'informations, les outils de détection produisent en continu un grand nombre d'al...
International audienceIn large distributed information systems, alert correlation systems are necess...
International audienceIn large distributed information systems, alert correlation systems are necess...
International audienceIn large distributed information systems, alert correlation systems are necess...
International audienceIn large distributed information systems, alert correlation systems are necess...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceInformation systems are prone to attacks. Those attacks can take different for...
International audienceIn distributed systems and in particular in industrial SCADA environments, ale...
International audienceInformation systems are prone to attacks. Those attacks can take different for...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
Dans les systèmes d'informations, les outils de détection produisent en continu un grand nombre d'al...
International audienceIn large distributed information systems, alert correlation systems are necess...
International audienceIn large distributed information systems, alert correlation systems are necess...
International audienceIn large distributed information systems, alert correlation systems are necess...
International audienceIn large distributed information systems, alert correlation systems are necess...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceInformation systems are prone to attacks. Those attacks can take different for...
International audienceIn distributed systems and in particular in industrial SCADA environments, ale...
International audienceInformation systems are prone to attacks. Those attacks can take different for...