International audienceIn large distributed information systems, alert correlation systems are necessary to handle the huge amount of elementary security alerts and to identify complex multi-step attacks within the flow of low level events and alerts. In this paper, we show that, once a human expert has provided an action tree derived from an attack tree, a fully automated transformation process can generate exhaustive correlation rules that would be tedious and error prone to enumerate by hand. The transformation relies on a detailed description of various aspects of the real execution environment (topology of the system, deployed services, etc.). Consequently, the generated correlation rules are tightly linked to the characteristics of the...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
[[abstract]]The current intrusion detection systems faced the problem of generating too many false a...
International audienceIn large distributed information systems, alert correlation systems are necess...
International audienceIn large distributed information systems, alert correlation systems are necess...
International audienceIn large distributed information systems, alert correlation systems are necess...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceInformation systems are prone to attacks. Those attacks can take different for...
International audienceInformation systems are prone to attacks. Those attacks can take different for...
International audienceInformation systems are prone to attacks. Those attacks can take different for...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
[[abstract]]The current intrusion detection systems faced the problem of generating too many false a...
International audienceIn large distributed information systems, alert correlation systems are necess...
International audienceIn large distributed information systems, alert correlation systems are necess...
International audienceIn large distributed information systems, alert correlation systems are necess...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceCurrent SIEM (Security Information and Event Management) provide very simple a...
International audienceInformation systems are prone to attacks. Those attacks can take different for...
International audienceInformation systems are prone to attacks. Those attacks can take different for...
International audienceInformation systems are prone to attacks. Those attacks can take different for...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
Information systems produce continuously a large amount of messages and alerts. In order to manage t...
[[abstract]]The current intrusion detection systems faced the problem of generating too many false a...