Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios

被引:0
|
作者
Godefroy, Erwan [1 ,2 ,3 ]
Totel, Eric [2 ]
Hurfin, Michel [3 ]
Majorczyk, Frederic [1 ]
机构
[1] DGA MI, Bruz, France
[2] Supelec, Rennes, France
[3] Inria, Rennes, France
关键词
Security and Protection; Intrusion detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In large distributed information systems, alert correlation systems are necessary to handle the huge amount of elementary security alerts and to identify complex multi-step attacks within the flow of low level events and alerts. In this paper, we show that, once a human expert has provided an action tree derived from an attack tree, a fully automated transformation process can generate exhaustive correlation rules that would be tedious and error prone to enumerate by hand. The transformation relies on a detailed description of various aspects of the real execution environment (topology of the system, deployed services, etc.). Consequently, the generated correlation rules are tightly linked to the characteristics of the monitored information system. The proposed transformation process has been implemented in a prototype that generates correlation rules expressed in an attack description language.
引用
收藏
页码:23 / 28
页数:6
相关论文
共 50 条
  • [1] Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios
    Godefroy, Erwan
    Totel, Eric
    Hurfin, Michel
    Majorczyk, Frederic
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2015, 10 (03): : 100 - 110
  • [2] Generation and Assessment of correlation rules to Detect Complex Attack Scenarios
    Godefroy, Erwan
    Totel, Eric
    Hurfin, Michel
    Majorczyk, Frederic
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 707 - 708
  • [3] An automatic complex event processing rules generation system for the recognition of real-time IoT attack patterns
    Roldan-Gomez, Jose
    Boubeta-Puig, Juan
    Carrillo-Mondejar, Javier
    Gomez, Juan Manuel Castelo
    del Rincon, Jesus Martinez
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2023, 123
  • [4] Automatic generation of requirement scenarios
    Kim, GMJ
    Myung, R
    CHALLENGES OF INFORMATION TECHNOLOGY MANAGEMENT IN THE 21ST CENTURY, 2000, : 430 - 433
  • [5] Automatic Hybrid Attack Graph (AHAG) Generation for Complex Engineering Systems
    Ibrahim, Mariam
    Alsheikh, Ahmad
    PROCESSES, 2019, 7 (11)
  • [6] AN AUTOMATIC-GENERATION OF RULES
    BOZEK, M
    NIEPEL, L
    COMPUTERS AND ARTIFICIAL INTELLIGENCE, 1989, 8 (06): : 581 - 589
  • [7] Using Cluster and Correlation to Construct Attack Scenarios
    Zhang, Yugang
    Mao, Shisong
    Zhuang, Xin
    Peng, Xi
    PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON CYBERWORLDS, 2008, : 471 - 476
  • [8] Survey: Automatic generation of attack trees and attack graphs
    Konsta, Alyzia-Maria
    Lafuente, Alberto Lluch
    Spiga, Beatrice
    Dragoni, Nicola
    COMPUTERS & SECURITY, 2024, 137
  • [9] DACA: Automated Attack Scenarios and Dataset Generation
    Korving, Frank
    Vaarandi, Risto
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS, 2023, : 550 - 558
  • [10] Automatic Generation of Attack Scripts from Attack Graphs
    Nichols, William
    Hill, Zac
    Hawrylak, Peter
    Hale, John
    Papa, Mauricio
    2018 1ST INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2018), 2018, : 267 - 274