2014 10th International Conference on Information Assurance and Security 2014
DOI: 10.1109/isias.2014.7064615
|View full text |Cite
|
Sign up to set email alerts
|

Automatic generation of correlation rules to detect complex attack scenarios

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Malware samples are classified in to different classes and rules for each class are generated with positional information of signature to improve performance. Godefroy et al suggested an approach to automatically create co-related rules [23]. A human expert provides action tree derived from attack tree and a fully automatic system creates co-related rules.…”
Section: Cmentioning
confidence: 99%
“…Malware samples are classified in to different classes and rules for each class are generated with positional information of signature to improve performance. Godefroy et al suggested an approach to automatically create co-related rules [23]. A human expert provides action tree derived from attack tree and a fully automatic system creates co-related rules.…”
Section: Cmentioning
confidence: 99%
“…When it is done by human experts, this is a non trivial, time consuming, and error-prone task. Thus a recent work [2] aims at producing the correlation rules through an automated process.…”
Section: State Of the Art: Alert Correlationmentioning
confidence: 99%
“…This representation of the attacker's behavior can be transformed into a correlation tree that represents all the sequences of events or alerts an attacker can generate in the supervised system. This approach has been followed in [2] and demonstrates that an attack can be associated with two similar representations corresponding respectively to the point of view of the attacker (attack tree) and the point of view of the defender (correlation tree). A base of knowledge about the system can be used to develop an automated process which establish the links between actions and possible observations and thus deduce the correlation rules from the attacker description [2].…”
Section: State Of the Art: Alert Correlationmentioning
confidence: 99%
See 2 more Smart Citations