A security alert fusion algorithm based on temporal scenario recognition is proposed. Known attack patterns are defined into temporal scenario models to process online or offline alert flow. Alert aggregation and alert correlation are performed simultaneously in the recognition procedure. Methods based on temporal reasoning are adopted to preprocess temporal scenario models, giving the recognition algorithm a high efficiency.EI03448-4594
Several alert correlation methods were proposed in the past several years to construct high-level at...
Perimeter surveillance systems play an important role in the safety and security of the armed forces...
We propose an adaptive cyber security monitoring system that integrates a number of component techni...
提出了一种基于时间场景识别的安全报警熔合算法.该算法将已知的攻击模式定义成时间场景模型来处理在线或离线的报警流.算法同时完成报警聚合以及报警关联两个工作,并且采用基于时间推理的方法来预处理场景模型,从...
Traditional intrusion detection systems (IDSs) focus on lowlevel attacks or anomalies, and raise ale...
International audienceAbstract: The main use of intrusion detection systems (IDS) is to detect attac...
Attacks to information systems are becoming moresophisticated and traditional algorithms supporting ...
To keep up with the increasing prevalence of cybersecurity attacks, improvements in the current prev...
The need for higher-level reasoning capabilities beyond low-level sensor abilities has prompted rese...
[[abstract]]As the rapid growth of network attacking tools, patterns of network intrusion events cha...
International audienceManaging and supervising security in large networks has become a challenging t...
[[abstract]]As the rapid growth of network attacking tools, patterns of network intrusion events cha...
Intrusion Detection Systems (IDS) warn of suspicious or malicious network activity and are a fundame...
Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and raise al...
Intrusion detection technique is important subtask that aggregates alert. Alert aggregation goal is ...
Several alert correlation methods were proposed in the past several years to construct high-level at...
Perimeter surveillance systems play an important role in the safety and security of the armed forces...
We propose an adaptive cyber security monitoring system that integrates a number of component techni...
提出了一种基于时间场景识别的安全报警熔合算法.该算法将已知的攻击模式定义成时间场景模型来处理在线或离线的报警流.算法同时完成报警聚合以及报警关联两个工作,并且采用基于时间推理的方法来预处理场景模型,从...
Traditional intrusion detection systems (IDSs) focus on lowlevel attacks or anomalies, and raise ale...
International audienceAbstract: The main use of intrusion detection systems (IDS) is to detect attac...
Attacks to information systems are becoming moresophisticated and traditional algorithms supporting ...
To keep up with the increasing prevalence of cybersecurity attacks, improvements in the current prev...
The need for higher-level reasoning capabilities beyond low-level sensor abilities has prompted rese...
[[abstract]]As the rapid growth of network attacking tools, patterns of network intrusion events cha...
International audienceManaging and supervising security in large networks has become a challenging t...
[[abstract]]As the rapid growth of network attacking tools, patterns of network intrusion events cha...
Intrusion Detection Systems (IDS) warn of suspicious or malicious network activity and are a fundame...
Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and raise al...
Intrusion detection technique is important subtask that aggregates alert. Alert aggregation goal is ...
Several alert correlation methods were proposed in the past several years to construct high-level at...
Perimeter surveillance systems play an important role in the safety and security of the armed forces...
We propose an adaptive cyber security monitoring system that integrates a number of component techni...