期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
A graph based system for multi-stage attacks recognition
1
作者 safaa o.al-mamory 《High Technology Letters》 EI CAS 2008年第2期167-173,共7页
Building attack scenario is one of the most important aspects in network security.This paper pro-posed a system which collects intrusion alerts,clusters them as sub-attacks using alerts abstraction,ag-gregates the sim... Building attack scenario is one of the most important aspects in network security.This paper pro-posed a system which collects intrusion alerts,clusters them as sub-attacks using alerts abstraction,ag-gregates the similar sub-attacks,and then correlates and generates correlation graphs.The scenarios wererepresented by alert classes instead of alerts themselves so as to reduce the required rules and have the a-bility of detecting new variations of attacks.The proposed system is capable of passing some of the missedattacks.To evaluate system effectiveness,it was tested with different datasets which contain multi-stepattacks.Compressed and easily understandable Correlation graphs which reflect attack scenarios were gen-erated.The proposed system can correlate related alerts,uncover the attack strategies,and detect newvariations of attacks. 展开更多
关键词 network security intrusion detection alert correlation attack graph SCENARIO clus-tering
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部