Systematic literature review of security event correlation methods

I Kotenko, D Gaifulina, I Zelichenok - Ieee Access, 2022 - ieeexplore.ieee.org
Security event correlation approaches are necessary to detect and predict incremental
threats such as multi-step or targeted attacks (advanced persistent threats) and other causal …

[HTML][HTML] Cyber-attack prediction based on network intrusion detection systems for alert correlation techniques: a survey

H Albasheer, M Md Siraj, A Mubarakali… - Sensors, 2022 - mdpi.com
Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of
enterprise networks against cyber-attacks. However, NIDS networks suffer from several …

Alert-driven attack graph generation using s-pdfa

A Nadeem, S Verwer, S Moskal… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific
to a network under observation. Such CTI currently requires extensive expert input for …

A layered reference model for penetration testing with reinforcement learning and attack graphs

T Cody - 2022 IEEE 29th Annual Software Technology …, 2022 - ieeexplore.ieee.org
This paper considers key challenges to using re-inforcement learning (RL) with attack
graphs to automate penetration testing in real-world applications from a systems …

Attack scenario reconstruction via fusing heterogeneous threat intelligence

X Zang, J Gong, X Zhang, G Li - Computers & Security, 2023 - Elsevier
Nowadays, new-generation threats often use multiple means or perform several steps to
intrude into networks and ultimately reach their objective. These new threats have multi …

[HTML][HTML] Systematic review and quantitative comparison of cyberattack scenario detection and projection

I Kovačević, S Groš, K Slovenec - Electronics, 2020 - mdpi.com
Intrusion Detection Systems (IDSs) automatically analyze event logs and network traffic in
order to detect malicious activity and policy violations. Because IDSs have a large number of …

[PDF][PDF] Multi-Zone-Wise Blockchain Based Intrusion Detection and Prevention System for IoT Environment.

S Kably, T Benbarrad, N Alaoui… - Computers, Materials & …, 2023 - cdn.techscience.cn
Blockchain merges technology with the Internet of Things (IoT) for addressing security and
privacy-related issues. However, conventional blockchain suffers from scalability issues due …

Sage: Intrusion alert-driven attack graph extractor

A Nadeem, S Verwer, SJ Yang - 2021 IEEE symposium on …, 2021 - ieeexplore.ieee.org
Attack graphs (AG) are used to assess pathways availed by cyber adversaries to penetrate a
network. State-of-the-art approaches for AG generation focus mostly on deriving …

An end-to-end method for advanced persistent threats reconstruction in large-scale networks based on alert and log correlation

Y Wang, Y Guo, C Fang - Journal of Information Security and Applications, 2022 - Elsevier
Nowadays, advanced persistent threats (APTs) compromise critical large-scale networks
more frequently, however, detecting these APTs is difficult. Since security sensors often miss …

MCM-CASR: Novel Alert Correlation Framework for Cyber Attack Scenario Reconstruction Based on NLP, NER, and Semantic Similarity

ML Diakhame, C Diallo, M Mejri - 2023 7th Cyber Security in …, 2023 - ieeexplore.ieee.org
Cyber attack scenario reconstruction plays a crucial role in understanding and mitigating
security breaches. In this paper, we propose a novel framework that leverages Natural …