Attack hypothesis generation

A Elitzur, R Puzis, P Zilberman - 2019 European Intelligence …, 2019 - ieeexplore.ieee.org
In recent years, the perpetrators of cyber-attacks have been playing a dynamic cat and
mouse game with cybersecurity analysts who try to trace the attack and reconstruct the …

Attack hypotheses generation based on threat intelligence knowledge graph

FK Kaiser, U Dardik, A Elitzur… - … on Dependable and …, 2023 - ieeexplore.ieee.org
Cyber threat intelligence on past attacks may help with attack reconstruction and the
prediction of the course of an ongoing attack by providing deeper understanding of the tools …

AttacKG: Constructing technique knowledge graph from cyber threat intelligence reports

Z Li, J Zeng, Y Chen, Z Liang - European Symposium on Research in …, 2022 - Springer
Cyber attacks are becoming more sophisticated and diverse, making attack detection
increasingly challenging. To combat these attacks, security practitioners actively summarize …

[PDF][PDF] An att&ck-kg for linking cybersecurity attacks to adversary tactics and techniques

K Kurniawan, A Ekelhart, E Kiesling - 2021 - eprints.cs.univie.ac.at
Leveraging knowledge graph techniques to detect and analyze cyber attacks is a promising
research direction at the interface between the semantic web and security research …

Causal knowledge analysis for detecting and modeling multi‐step attacks

A Ahmadian Ramaki… - Security and …, 2016 - Wiley Online Library
In order to understand the security level of an organization network, detection methods are
important to tackle the probable risks of the attackers' malicious activities. Intrusion detection …

A framework for modeling cyber attack techniques from security vulnerability descriptions

H Binyamini, R Bitton, M Inokuchi, T Yagyu… - Proceedings of the 27th …, 2021 - dl.acm.org
Attack graphs are one of the main techniques used to automate the cybersecurity risk
assessment process. In order to derive a relevant attack graph, up-to-date information on …

Design procedure of knowledge base for practical attack graph generation

M Inokuchi, Y Ohta, S Kinoshita, T Yagyu… - Proceedings of the …, 2019 - dl.acm.org
Cyber security assessment is an essential activity for understanding the security risks in an
enterprise environment. While many tools have been developed in order to evaluate the …

An automated, end-to-end framework for modeling attacks from vulnerability descriptions

H Binyamini, R Bitton, M Inokuchi, T Yagyu… - arXiv preprint arXiv …, 2020 - arxiv.org
Attack graphs are one of the main techniques used to automate the risk assessment
process. In order to derive a relevant attack graph, up-to-date information on known attack …

Attack scenario reconstruction approach using attack graph and alert data mining

H Hu, J Liu, Y Zhang, Y Liu, X Xu, J Tan - Journal of Information Security …, 2020 - Elsevier
Existing alert correlation methods do not consider the unsuccessful paths and true negative
alerts of IDS, which affects the completeness and visualization of attack restoring. To …

Mapping cyber threat intelligence to probabilistic attack graphs

A Gylling, M Ekstedt, Z Afzal… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
As cyber threats continue to grow and expertise resources are limited, organisations need to
find ways to evaluate their resilience efficiently and take proactive measures against an …