A systematic survey on multi-step attack detection

J Navarro, A Deruyver, P Parrend - Computers & Security, 2018 - Elsevier
Since the beginning of the Internet, cyberattacks have threatened users and organisations.
They have become more complex concurrently with computer networks. Nowadays …

Systematic review and quantitative comparison of cyberattack scenario detection and projection

I Kovačević, S Groš, K Slovenec - Electronics, 2020 - mdpi.com
Intrusion Detection Systems (IDSs) automatically analyze event logs and network traffic in
order to detect malicious activity and policy violations. Because IDSs have a large number of …

Real-time multistep attack prediction based on hidden markov models

P Holgado, VA Villagrá… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
A novel method based on the Hidden Markov Model is proposed to predict multistep attacks
using IDS alerts. We consider the hidden states as similar phases of a particular type of …

Taxonomy of intrusion risk assessment and response system

A Shameli-Sendi, M Cheriet, A Hamou-Lhadj - Computers & Security, 2014 - Elsevier
In recent years, we have seen notable changes in the way attackers infiltrate computer
systems compromising their functionality. Research in intrusion detection systems aims to …

Hidden markov model and cyber deception for the prevention of adversarial lateral movement

MAR Al Amin, S Shetty, L Njilla, DK Tosh… - IEEE …, 2021 - ieeexplore.ieee.org
Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted
nation-states and their associated entities, including private and corporate sectors. Cyber …

[PDF][PDF] Real time intrusion prediction based on optimized alerts with hidden Markov model

AS Sendi, M Dagenais, M Jabbarifar… - Journal of …, 2012 - researchgate.net
Cyber attacks and malicious activities are rapidly becoming a major threat to proper secure
organization. Many security tools may be installed in distributed systems and monitor all …

Alert correlation and prediction using data mining and HMM.

H Farhadi, M AmirHaeri, M Khansari - ISeCure, 2011 - search.ebscohost.com
Abstract Intrusion Detection Systems (IDSs) are security tools widely used in computer
networks. While they seem to be promising technologies, they pose some serious …

Graph based metrics for intrusion response measures in computer networks

M Jahnke, C Thul, P Martini - 32nd IEEE Conference on Local …, 2007 - ieeexplore.ieee.org
This contribution presents a graph based approach for modelling the effects of both attacks
against computer networks and response measures as reactions against the attacks. Certain …

A finite state hidden markov model for predicting multistage attacks in cloud systems

HA Kholidy, A Erradi, S Abdelwahed… - 2014 IEEE 12th …, 2014 - ieeexplore.ieee.org
Cloud computing significantly increased the security threats because intruders can exploit
the large amount of cloud resources for their attacks. However, most of the current security …

Quantitative method for network security situation based on attack prediction

H Hu, H Zhang, Y Liu, Y Wang - Security and Communication …, 2017 - Wiley Online Library
Multistep attack prediction and security situation awareness are two big challenges for
network administrators because future is generally unknown. In recent years, many …