Deploying a large number of information security (INFOSEC) systems can provide in-depth protection for systems and networks. However, the sheer number of security alerts output by security sensors can overwhelm security analysts from performing effective analysis and taking timely response. Therefore, alert correlation is the core component in a security management system. Most of existing alert correlation techniques depend on a priori and hard-coded domain knowledge that lead to their limited capabilities of detecting new attack strategies. These approaches also focus more on the aggregation and analysis of raw security alerts, and build basic or low-level attack scenarios. This thesis focuses on discovering novel attack strategies with...
International audienceIn large distributed information systems, alert correlation systems are necess...
The evolutions of computer network attacks have urged many organizations to install multiple Network...
To support information security, organizations deploy Intrusion Detection Systems (IDS) that monitor...
Abstract. Correlating security alerts and discovering attack strategies are important and challengin...
Alert correlation is a process that analyzes the raw alerts produced by one or more intrusion detect...
The tremendous increase in usage and complexity of modern communication and network systems connecte...
Event Correlation used to be a widely used technique for interpreting alert logs and discovering net...
Management of intrusion alarms particularly in identifying malware attack is becoming more demanding...
An intrusion detection system (IDS) perform postcompromise detection of security breaches whenever p...
In this paper, we present AIDA, an analytical framework for processing intrusion detection alerts wi...
Cyber attacks are becoming increasingly complex, especially when the target is a modern IT infrastru...
Alert correlation is a process that analyzes the raw alerts produced by one or more intrusion detect...
Cyber attacks are becoming increasingly complex, especially when the target is a modern IT infrastru...
Complementary security systems are widely deployed in networks to protect digital assets. Alert corr...
International audienceAlert correlation plays an increasingly crucial role in nowadays computer secu...
International audienceIn large distributed information systems, alert correlation systems are necess...
The evolutions of computer network attacks have urged many organizations to install multiple Network...
To support information security, organizations deploy Intrusion Detection Systems (IDS) that monitor...
Abstract. Correlating security alerts and discovering attack strategies are important and challengin...
Alert correlation is a process that analyzes the raw alerts produced by one or more intrusion detect...
The tremendous increase in usage and complexity of modern communication and network systems connecte...
Event Correlation used to be a widely used technique for interpreting alert logs and discovering net...
Management of intrusion alarms particularly in identifying malware attack is becoming more demanding...
An intrusion detection system (IDS) perform postcompromise detection of security breaches whenever p...
In this paper, we present AIDA, an analytical framework for processing intrusion detection alerts wi...
Cyber attacks are becoming increasingly complex, especially when the target is a modern IT infrastru...
Alert correlation is a process that analyzes the raw alerts produced by one or more intrusion detect...
Cyber attacks are becoming increasingly complex, especially when the target is a modern IT infrastru...
Complementary security systems are widely deployed in networks to protect digital assets. Alert corr...
International audienceAlert correlation plays an increasingly crucial role in nowadays computer secu...
International audienceIn large distributed information systems, alert correlation systems are necess...
The evolutions of computer network attacks have urged many organizations to install multiple Network...
To support information security, organizations deploy Intrusion Detection Systems (IDS) that monitor...