2018
DOI: 10.1186/s13635-018-0075-x
|View full text |Cite
|
Sign up to set email alerts
|

OMMA: open architecture for Operator-guided Monitoring of Multi-step Attacks

Abstract: Current attacks are complex and stealthy. The recent WannaCry malware campaign demonstrates that this is true not only for targeted operations, but also for massive attacks. Complex attacks can only be described as a set of individual actions composing a global strategy. Most of the time, different devices are involved in the same attack scenario. Information about the events recorded in these devices can be collected in the shape of logs in a central system, where an automatic search of threat traces can be i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 36 publications
0
5
0
Order By: Relevance
“…Other studies used statistical analysis–based detection models, which have problems in areas such as time and accuracy; for examples of these studies, see Refs. [ 65 , 68 , 69 , 73 , 85 , 87 , 99 , 111 , 116 , 127 ].…”
Section: Discussionmentioning
confidence: 99%
“…Other studies used statistical analysis–based detection models, which have problems in areas such as time and accuracy; for examples of these studies, see Refs. [ 65 , 68 , 69 , 73 , 85 , 87 , 99 , 111 , 116 , 127 ].…”
Section: Discussionmentioning
confidence: 99%
“…Learning From Observables. Cyber data from prior security incidents can be utilized to gain insights into attacker behavior, e.g., using log data [35], [36], [37], sensor data [38], and network traffic [39]. Process mining and Markov models are particularly well-suited for sequential learning problems.…”
Section: Related Workmentioning
confidence: 99%
“…ML application is challenging. In recent years, machine learning (ML) has emerged as a promising solution for obtaining insights into attacker behavior [6,9,11,12]. ML application requires that the following three challenges be addressed:…”
Section: Motivation and Related Workmentioning
confidence: 99%