2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing 2014
DOI: 10.1109/dasc.2014.19
|View full text |Cite
|
Sign up to set email alerts
|

An Approach of Discovering Causal Knowledge for Alert Correlating Based on Data Mining

Abstract: The process of attackers exploiting the target facilities is always gradual in cyberspace, and multiple attack steps would be performed in order to achieve the ultimate goal. How to identify the attack scenarios is one of the challenges in many research fields, such as cyberspace security situation awareness, the detection of APT (Advanced Persistent Threat) and so on. Alert correlation analysis based on causal knowledge is one of the widely adopted methods in CEP (Complex Event Processing), which is a promisi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 10 publications
(9 reference statements)
0
8
0
Order By: Relevance
“…The knowledge of logic relation, reasoning method, and probability calculation is included in the state transition of directed graph. Attack graph model [5,101,112,128,129], Bayesian model [11,62,114,132], Markov model [53,109,162], and so on all adopt this method. The solution method mainly includes two steps: reachability analysis and quantitative calculation analysis.…”
Section: Classification Of Solution Analysis Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…The knowledge of logic relation, reasoning method, and probability calculation is included in the state transition of directed graph. Attack graph model [5,101,112,128,129], Bayesian model [11,62,114,132], Markov model [53,109,162], and so on all adopt this method. The solution method mainly includes two steps: reachability analysis and quantitative calculation analysis.…”
Section: Classification Of Solution Analysis Methodsmentioning
confidence: 99%
“…The definition of the model is generally combined with other disciplines, such as Petri network [96,[153][154][155], game theory [108,124,[159][160][161][162], and Bayesian network [114,132], and some articles also focus on the improvement of model description ability [125,126]; the solution algorithm depends on the definition of the model, and it is generally shown together with the solution result. There are lots of literature [109][110][111][112][113][114] trying to improve on this point, such as the reachable path analysis based on attack graph [101,128,129,143,177], defense strategy analysis [111,124,161], and survivability analysis [126].…”
Section: Status Of Domestic Researchmentioning
confidence: 99%
See 2 more Smart Citations
“…Considering that one attacker performs multiple attack steps to reach its goal, Xuewei et al [16] propose an approach to automatically identify the multistage attacks in intrusion alerts. First, alerts are clustered by related IP addresses using the method of connected components.…”
Section: Related Workmentioning
confidence: 99%