Alert-driven attack graph generation using s-pdfa

A Nadeem, S Verwer, S Moskal… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific
to a network under observation. Such CTI currently requires extensive expert input for …

Mapping evidence graphs to attack graphs

C Liu, A Singhal, D Wijesekera - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
Attack graphs compute potential attack paths from a system configuration and known
vulnerabilities of a system. Evidence graphs model intrusion evidence and dependencies …

Recommender systems meeting security: From product recommendation to cyber-attack prediction

N Polatidis, E Pimenidis, M Pavlidis… - … Applications of Neural …, 2017 - Springer
Modern information society depends on reliable functionality of information systems
infrastructure, while at the same time the number of cyber-attacks has been increasing over …

[PDF][PDF] An evolutionary approach of attack graph to attack tree conversion

MS Haque, T Atkison - International Journal of Computer Network …, 2017 - mecs-press.org
The advancement of modern day computing has led to an increase of threats and intrusions.
As a result, advanced security measurements and threat analysis models are necessary to …

Machine learning on knowledge graphs for context-aware security monitoring

JS Garrido, D Dold, J Frank - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Machine learning techniques are gaining attention in the context of intrusion detection due
to the increasing amounts of data generated by monitoring tools, as well as the …

Looking beyond IoCs: Automatically extracting attack patterns from external CTI

MT Alam, D Bhusal, Y Park, N Rastogi - Proceedings of the 26th …, 2023 - dl.acm.org
Public and commercial organizations extensively share cyberthreat intelligence (CTI) to
prepare systems to defend against existing and emerging cyberattacks. However, traditional …

Efficient attack correlation and identification of attack scenarios based on network-motifs

S Haas, F Wilkens, M Fischer - 2019 IEEE 38th International …, 2019 - ieeexplore.ieee.org
An Intrusion Detection System (IDS) to secure computer networks reports indicators for an
attack as alerts. However, every attack can result in a multitude of IDS alerts that need to be …

Identification of attack paths using kill chain and attack graphs

L Sadlek, P Čeleda, D Tovarňák - NOMS 2022-2022 IEEE/IFIP …, 2022 - ieeexplore.ieee.org
The ever-evolving capabilities of cyber attackers force security administrators to focus on the
early identification of emerging threats. Targeted cyber attacks usually consist of several …

[PDF][PDF] Visualizing interesting patterns in cyber threat intelligence using machine learning techniques

S Ejaz, U Noor, Z Rashid - Cybernetics and Information Technologies, 2022 - sciendo.com
In an advanced and dynamic cyber threat environment, organizations need to yield more
proactive methods to handle their cyber defenses. Cyber threat data known as Cyber Threat …

A stochastic framework for quantitative analysis of attack-defense trees

R Jhawar, K Lounis, S Mauw - … Heraklion, Crete, Greece, September 26-27 …, 2016 - Springer
Cyber attacks are becoming increasingly complex, practically sophisticated and organized.
Losses due to such attacks are important, varying from the loss of money to business …