International audienceCurrent SIEM (Security Information and Event Management) provide very simple alert correlation languages that express at best the recognition of a sequence of alerts. That’s why our team developed a correlation tool called GnG that describes the attacks in ADeLe (Attack Description Language). This language provides an efficient way to describe complex multi-steps attack scenarios. However, the experience proved that writing such correlation rules is very difficult. It requires a high level of knowledge of the attack and the supervision mech- anisms deployed in the system. In this paper, we show that, starting from an enriched attack tree that describes the attack, an automated process can generate exhaustive correlatio...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
Several alert correlation methods were proposed in the past several years to construct high-level at...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceIn large distributed information systems, alert correlation systems are necess...
International audienceIn large distributed information systems, alert correlation systems are necess...
International audienceIn large distributed information systems, alert correlation systems are necess...
International audienceIn large distributed information systems, alert correlation systems are necess...
International audienceInformation systems are prone to attacks. Those attacks can take different for...
International audienceInformation systems are prone to attacks. Those attacks can take different for...
International audienceInformation systems are prone to attacks. Those attacks can take different for...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
Several alert correlation methods were proposed in the past several years to construct high-level at...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceIn large distributed information systems, alert correlation systems are necess...
International audienceIn large distributed information systems, alert correlation systems are necess...
International audienceIn large distributed information systems, alert correlation systems are necess...
International audienceIn large distributed information systems, alert correlation systems are necess...
International audienceInformation systems are prone to attacks. Those attacks can take different for...
International audienceInformation systems are prone to attacks. Those attacks can take different for...
International audienceInformation systems are prone to attacks. Those attacks can take different for...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
Several alert correlation methods were proposed in the past several years to construct high-level at...