2017 IEEE Conference on Energy Internet and Energy System Integration (EI2) 2017
DOI: 10.1109/ei2.2017.8245631
|View full text |Cite
|
Sign up to set email alerts
|

Alert correlation analysis based on attack path graph

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…In recent years, network security event aggregation and correlation analysis that are based on the research on the correlation algorithm have gradually become hot spots in the field of network security, and some meaningful results have been produced. Researchers have done a lot of work on the correlation of events and have proposed methods, such as alert correlation based on a sequence [ 15 , 16 , 17 ], alert correlation based on known scenarios [ 18 ], and alert correlation based on attribute similarity [ 19 , 20 ].…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…In recent years, network security event aggregation and correlation analysis that are based on the research on the correlation algorithm have gradually become hot spots in the field of network security, and some meaningful results have been produced. Researchers have done a lot of work on the correlation of events and have proposed methods, such as alert correlation based on a sequence [ 15 , 16 , 17 ], alert correlation based on known scenarios [ 18 ], and alert correlation based on attribute similarity [ 19 , 20 ].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The framework changes a series of alerts into a set of alerts and then serializes them in the form of super alerts in the prediction of the next attack. In [ 18 ], early warnings are correlated based on a knowledge base and the related likelihood. An attack path construction algorithm is proposed for obtaining the attack path of the specified target IP, and an alert correlation graph is constructed to correlate the alerts to a specific range and then merge them based on the alert type.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In terms of attack scenario restoration, Peng et al [22] proposed an alert correlation method based on the causality of attacks. Zhang et al [23] proposed a real-time alert correlation analysis method based on an attack plan graph, which improved the attack scenario.…”
Section: Related Workmentioning
confidence: 99%