2021 International Conference on Smart Energy Systems and Technologies (SEST) 2021
DOI: 10.1109/sest50973.2021.9543359
|View full text |Cite
|
Sign up to set email alerts
|

Towards an Approach to Contextual Detection of Multi-Stage Cyber Attacks in Smart Grids

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…In the context of situational awareness for intrusion detection, our SIDS can act as a low-level sensor that provides domain-specific indicators of multi-staged cyber-attacks. Alerts can be centrally processed with other indicators from other IDS sensors through a correlation system based on Security Information and Event Management (SIEM) to reconstruct the attack sequence [47,48].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the context of situational awareness for intrusion detection, our SIDS can act as a low-level sensor that provides domain-specific indicators of multi-staged cyber-attacks. Alerts can be centrally processed with other indicators from other IDS sensors through a correlation system based on Security Information and Event Management (SIEM) to reconstruct the attack sequence [47,48].…”
Section: Discussionmentioning
confidence: 99%
“…Alert generation is triggered by various components for different reasons. The cyber threat information database represents the collection of alerts combined with the specification of the infrastructure, which is part of a higher-level correlation as presented in our previous work [47,48].…”
Section: Framework Overviewmentioning
confidence: 99%
“…A common way of modeling a multi-stage attacks is by creating its attack graph representation. It enables extraction of contextual information via correlation and reasoning over the attackrelated data to classify or infer characteristics and relations between entities involved in the attack [20].…”
Section: B Contextual Detection Of Cyber Attacksmentioning
confidence: 99%