Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techniques to analyze attack scenarios from security alerts. However, most of these approaches depend on a priori and hard-coded domain knowledge that lead to their limited capabilities of detecting new attack strategies. In this paper, we propose an approach to discover novel attack strategies. Our approach includes two complementary correlation mechanisms based on two hypotheses of attack step relationship. The first hypothesis is that attack steps are directly related because an earlier attack enables or positively affects the later one. For this type of attack relat...
Understanding the strategies of attacks is crucial for security applications such as computer and n...
Several alert correlation methods were proposed in the past several years to construct high-level at...
Attacks to information systems are becoming moresophisticated and traditional algorithms supporting ...
Understanding strategies of attacks is crucial for security applications such as computer and networ...
Cyber attacks are becoming increasingly complex, especially when the target is a modern IT infrastru...
Cyber attacks are becoming increasingly complex, especially when the target is a modern IT infrastru...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
Deploying a large number of information security (INFOSEC) systems can provide in-depth protection f...
Current techniques employed in security alert correlation area for multi-step attack recognition pur...
Current techniques employed in security alert correlation area for multi-step attack recognition pur...
Attacks to information systems are becoming moresophisticated and traditional algorithms supporting ...
Abstract—Attacks to information systems are becoming more sophisticated and traditional algorithms s...
Understanding the strategies of attacks is crucial for security applications such as computer and n...
Several alert correlation methods were proposed in the past several years to construct high-level at...
Attacks to information systems are becoming moresophisticated and traditional algorithms supporting ...
Understanding strategies of attacks is crucial for security applications such as computer and networ...
Cyber attacks are becoming increasingly complex, especially when the target is a modern IT infrastru...
Cyber attacks are becoming increasingly complex, especially when the target is a modern IT infrastru...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
Deploying a large number of information security (INFOSEC) systems can provide in-depth protection f...
Current techniques employed in security alert correlation area for multi-step attack recognition pur...
Current techniques employed in security alert correlation area for multi-step attack recognition pur...
Attacks to information systems are becoming moresophisticated and traditional algorithms supporting ...
Abstract—Attacks to information systems are becoming more sophisticated and traditional algorithms s...
Understanding the strategies of attacks is crucial for security applications such as computer and n...
Several alert correlation methods were proposed in the past several years to construct high-level at...
Attacks to information systems are becoming moresophisticated and traditional algorithms supporting ...