Detection algorithm for multi-step attack based on CTPN

被引:0
|
作者
Yan, Fen [1 ,2 ]
Huang, Hao [1 ]
Yin, Xin-Chun [2 ]
机构
[1] State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210093, China
[2] Department of Computer Science and Engineering, Technology Institute, Yangzhou University, Yangzhou 225009, China
来源
关键词
Security systems;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1383 / 1391
相关论文
共 50 条
  • [1] A systematic survey on multi-step attack detection
    Navarro, Julio
    Deruyver, Aline
    Parrend, Pierre
    COMPUTERS & SECURITY, 2018, 76 : 214 - 249
  • [2] MAD: A Middleware Framework for Multi-Step Attack Detection
    Papadopoulos, Panagiotis
    Petsas, Thanasis
    Christou, Giorgos
    Vasiliadis, Giorgos
    2015 4TH INTERNATIONAL WORKSHOP ON BUILDING ANALYSIS DATASETS AND GATHERING EXPERIENCE RETURNS FOR SECURITY (BADGERS), 2015, : 8 - 15
  • [3] RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection
    Ramaki, Ali Ahmadian
    Amini, Morteza
    Atani, Reza Ebrahimi
    COMPUTERS & SECURITY, 2015, 49 : 206 - 219
  • [4] Multi-step attack detection method based on network communication anomaly recognition
    Ju A.
    Guo Y.
    Li T.
    Ye Z.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (07): : 57 - 66
  • [5] A Privacy-Preserving Multi-step Attack Correlation Algorithm
    Xian, Minyi
    Zhang, Yongtang
    PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 1389 - 1393
  • [6] Corrosion detection by multi-step genetic algorithm
    Amaya, K.
    Ridha, M.
    Aoki, S.
    SIMULATION OF ELECTROCHEMICAL PROCESSES II, 2007, 54 : 299 - +
  • [7] Multi-layer episode filtering for the multi-step attack detection
    Soleimani, Mahbobeh
    Ghorbani, Ali A.
    COMPUTER COMMUNICATIONS, 2012, 35 (11) : 1368 - 1379
  • [8] Multi-Step Attack Pattern Detection on Normalized Event Logs
    Jaeger, David
    Ussath, Martin
    Cheng, Feng
    Meinel, Christoph
    2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud), 2015, : 390 - 398
  • [9] Multi-Step Attack Detection Based on Pre-Trained Hidden Markov Models
    Zhang, Xu
    Wu, Ting
    Zheng, Qiuhua
    Zhai, Liang
    Hu, Haizhong
    Yin, Weihao
    Zeng, Yingpei
    Cheng, Chuanhui
    SENSORS, 2022, 22 (08)
  • [10] A Multi-Step Attack Detection Model Based on Alerts of Smart Grid Monitoring System
    Zhang, Hua
    Jin, Xueqi
    Li, Ying
    Jiang, Zhengwei
    Liang, Ye
    Jin, Zhengping
    Wen, Qiaoyan
    IEEE ACCESS, 2020, 8 (08) : 1031 - 1047