2024
DOI: 10.3390/network4010004
|View full text |Cite
|
Sign up to set email alerts
|

A Hierarchical Security Event Correlation Model for Real-Time Threat Detection and Response

Herbert Maosa,
Karim Ouazzane,
Mohamed Chahine Ghanem

Abstract: An intrusion detection system (IDS) perform postcompromise detection of security breaches whenever preventive measures such as firewalls do not avert an attack. However, these systems raise a vast number of alerts that must be analyzed and triaged by security analysts. This process is largely manual, tedious, and time-consuming. Alert correlation is a technique that reduces the number of intrusion alerts by aggregating alerts that are similar in some way. However, the correlation is performed outside the IDS t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 39 publications
0
1
0
Order By: Relevance
“…Many of these security devices use separate log-collection and analysis servers to detect cyberattacks, gather logs from target nodes, and collect events from network security devices for abnormal detection [1,2]. An abnormal detection event is considered a potential threat and processed as a DROP policy object to prevent attack attempts when it exceeds a predetermined threshold [3]. Tightening these thresholds enhances security and increases the firewall load [4].…”
Section: Introductionmentioning
confidence: 99%
“…Many of these security devices use separate log-collection and analysis servers to detect cyberattacks, gather logs from target nodes, and collect events from network security devices for abnormal detection [1,2]. An abnormal detection event is considered a potential threat and processed as a DROP policy object to prevent attack attempts when it exceeds a predetermined threshold [3]. Tightening these thresholds enhances security and increases the firewall load [4].…”
Section: Introductionmentioning
confidence: 99%