Extracting attack scenarios using intrusion semantics

10Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Building the attack scenario is the first step to understand an attack and extract useful attack intelligence. Existing attack scenario reconstruction approaches, however, suffer from several limitations that weaken the elicitation of the attack scenarios and decrease the quality of the generated attack scenarios. In this paper, we discuss the limitations of the existing attack scenario reconstruction approaches and propose a novel hybrid approach using semantic analysis and intrusion ontology. Our approach can reconstruct known and unknown attack scenarios and correlate alerts generated in multi-sensor IDS environment. Our experimental results show the potential of our approach and its advantages over previous approaches. © 2013 Springer-Verlag.

Cite

CITATION STYLE

APA

Saad, S., & Traore, I. (2013). Extracting attack scenarios using intrusion semantics. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7743 LNCS, pp. 278–292). https://doi.org/10.1007/978-3-642-37119-6_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free