2017 IEEE Trustcom/BigDataSE/Icess 2017
DOI: 10.1109/trustcom/bigdatase/icess.2017.301
|View full text |Cite
|
Sign up to set email alerts
|

NetworkTrace: Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Karafili et al [15] developed an automated argumentation-based reasoner using both technical and social evidence. Xu et al [16] proposed a dependence probability algorithm to analyze and quantify the correlation between network attack traces. However, these methods heavily rely on pre-defined feature sets or association rules based on expert knowledge, which may not adapt well to the dynamic changes in the network environment.…”
Section: Apt Group Correlation Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Karafili et al [15] developed an automated argumentation-based reasoner using both technical and social evidence. Xu et al [16] proposed a dependence probability algorithm to analyze and quantify the correlation between network attack traces. However, these methods heavily rely on pre-defined feature sets or association rules based on expert knowledge, which may not adapt well to the dynamic changes in the network environment.…”
Section: Apt Group Correlation Analysismentioning
confidence: 99%
“…Few studies have focused on analyzing the correlations between APT groups. Some methods [13][14][15][16] explore correlations between attack behaviors to uncover associations between incidents. However, individual incident relevance is subject to change and does not fully represent APT group attack patterns.…”
Section: Introductionmentioning
confidence: 99%