2018 IEEE International Conference on Intelligence and Security Informatics (ISI) 2018
DOI: 10.1109/isi.2018.8587402
|View full text |Cite
|
Sign up to set email alerts
|

Extracting and Evaluating Similar and Unique Cyber Attack Strategies from Intrusion Alerts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1

Relationship

3
4

Authors

Journals

citations
Cited by 12 publications
(17 citation statements)
references
References 12 publications
0
17
0
Order By: Relevance
“…Process mining uses alert signatures as identifiers, so it cannot be used for modeling contextually different attack stages having the same alert signature. ii) Markov-based methods such as, Markov chains have been used to build alert correlation systems [6,15], and Hidden Markov Models have been used to build alert forecasting systems [8]. Specifically, Moskal et al [15] use Markov chains to construct sequences of attacker strategies from IDS alerts.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Process mining uses alert signatures as identifiers, so it cannot be used for modeling contextually different attack stages having the same alert signature. ii) Markov-based methods such as, Markov chains have been used to build alert correlation systems [6,15], and Hidden Markov Models have been used to build alert forecasting systems [8]. Specifically, Moskal et al [15] use Markov chains to construct sequences of attacker strategies from IDS alerts.…”
Section: Related Workmentioning
confidence: 99%
“…ii) Markov-based methods such as, Markov chains have been used to build alert correlation systems [6,15], and Hidden Markov Models have been used to build alert forecasting systems [8]. Specifically, Moskal et al [15] use Markov chains to construct sequences of attacker strategies from IDS alerts. In this paper, we build upon [15] and leverage the temporal and probabilistic dependence between alerts to generate alert-driven attack graphs.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…They are especially interested in multi-stage cyber attacks. Their research in this area includes the characterization of multi-stage cyber attacks [23,25] and the creation of a system for multi-stage attack emulation that fuses concepts from computer networks, system vulnerabilities, attack behaviors, and scenarios [70]. More recent works include generating attack models without a priori knowledge [78] and investigating the use of Generative Adversarial Networks to learn and generate synthetic alert scenarios [90].…”
Section: Research Groupsmentioning
confidence: 99%