Third IEEE International Workshop on Information Assurance (IWIA'05)
DOI: 10.1109/iwia.2005.3
|View full text |Cite
|
Sign up to set email alerts
|

An Alert Fusion Framework for Situation Awareness of Coordinated Multistage Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 20 publications
(15 citation statements)
references
References 8 publications
0
15
0
Order By: Relevance
“…This will end up with uncertainty reduction in threat pattern identification and increasing understanding of the system. In figure 8, three phases of recognition, identification, representation and real-time processing of complex event in an advanced cyber threat recognition and identification system are shown [9,11]. …”
Section: Complex Event Processing Based On Data Fusionmentioning
confidence: 99%
See 1 more Smart Citation
“…This will end up with uncertainty reduction in threat pattern identification and increasing understanding of the system. In figure 8, three phases of recognition, identification, representation and real-time processing of complex event in an advanced cyber threat recognition and identification system are shown [9,11]. …”
Section: Complex Event Processing Based On Data Fusionmentioning
confidence: 99%
“…In this kind of fusion which is the high level of fusion, decision composition is done by multiple fault independent classifiers (with the same identification problem). Also, decision fusion using multiple individual attributes which reflect different features of a threat and are gained by different sensors from different cyber space or by different agents in cyber defense systems, improve the identification accuracy of a single classifier [11,13].…”
Section: Evidential Fusion For Improvement Of Cyber Threat Pattern Rementioning
confidence: 99%
“…Attack Graphs have been shown to have quadratic complexity with exploit based representations under reasonable assumptions [1]. This exploit based representation has been used in [6], [13], [11] and others, but practical implementation is still problematic. Exhuastive enumeration of all possible exploits for different platforms is required and one needs to have all possible combinations of exploits represented in the graph; something that may not be feasible as this information requires experimental evaluation in many cases.…”
Section: Introductionmentioning
confidence: 99%
“…Several schemes have been proposed for Intrusion Detection System (IDS) alert correlation including a framework for real-time attack scenario detection by ¡ Research supported in part by Alion Science and Technology subcontract F30602-03-C-0245 from ARDA and AFRL programs the authors in [2]. The primary (and often, the only) source of alerts in most networks is the open source sensor Snort [11].…”
Section: Introductionmentioning
confidence: 99%
“…This provides the analyst with the necessary information to be able to take time-critical decisions without being overwhelmed by the volume of alerts. This alert categorization method is incorporated into the alert fusion system presented by the authors in [2]. We demonstrate the utility of the approach in enhancing the output of the fusion engine and in providing improved Situation Awareness by testing with actual multistage attack scenarios.…”
Section: Introductionmentioning
confidence: 99%