2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2021
DOI: 10.1109/trustcom53373.2021.00106
|View full text |Cite
|
Sign up to set email alerts
|

MAAC: Novel Alert Correlation Method To Detect Multi-step Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…Another way of correlation is the analysis of semantically similar events. MAAC (Wang et al, 2021a) (Multi-step Attack detection by Alert Correlation) uses Doc2vec to get the semantic representation of the alert description and calculates the cosine distance of the generated vector. MAAC matches the alerts and creates a graph first for alerts generated on the same host and then between hosts.…”
Section: Hybrid Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…Another way of correlation is the analysis of semantically similar events. MAAC (Wang et al, 2021a) (Multi-step Attack detection by Alert Correlation) uses Doc2vec to get the semantic representation of the alert description and calculates the cosine distance of the generated vector. MAAC matches the alerts and creates a graph first for alerts generated on the same host and then between hosts.…”
Section: Hybrid Modelsmentioning
confidence: 99%
“…Causal-based correlation methods make it easy to interpret the results of correlation by the operator. Therefore, this category of methods is well suited for visualizing the sequence of events (Heigl et al, 2021;Wang et al, 2021a). The simplicity of implementing such models is reduced, and also requires more computing resources to process a large amount of data.…”
Section: Summary Of Ai-based Security Event Correlation Modelsmentioning
confidence: 99%
“…Subsequently, endpoint security is not simply a need for information insurance and network safety yet additionally for administrative adherence and keeping up with entrust with clients and accomplices. In any case, it faces impediments, for example, asset overutilization, dependence on signaturebased identification strategies, and a web association prerequisite for specific capabilities [3]. Vitally, EPP battles to battle insider dangers, which is where EDR becomes an integral factor.…”
Section: Need Of Endpoint Securitymentioning
confidence: 99%
“…The future work incorporates the extension of safety strategies and the execution of a more exhaustive remediation instrument. This mirrors the persistent need to adjust and further develop endpoint security advances to keep up with powerful insurance against advancing dangers [3]. The changing danger scene requires a proactive data security approach, zeroing in on precautionary measures as opposed to responsive safeguards.…”
Section: Evolution Of Endpoint Securitymentioning
confidence: 99%
“…The key lies in analyzing the cause-and-effect relationships between alert information before and after, thus establishing the correlation between alert information [3,4]. This approach aids in reconstructing the complete attack path and attack scenario of MSA.…”
Section: Section 1: Introductionmentioning
confidence: 99%