Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios

被引:0
|
作者
Godefroy, Erwan [1 ,2 ,3 ]
Totel, Eric [2 ]
Hurfin, Michel [3 ]
Majorczyk, Frederic [1 ]
机构
[1] DGA MI, Bruz, France
[2] Supelec, Rennes, France
[3] Inria, Rennes, France
关键词
Security and Protection; Intrusion detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In large distributed information systems, alert correlation systems are necessary to handle the huge amount of elementary security alerts and to identify complex multi-step attacks within the flow of low level events and alerts. In this paper, we show that, once a human expert has provided an action tree derived from an attack tree, a fully automated transformation process can generate exhaustive correlation rules that would be tedious and error prone to enumerate by hand. The transformation relies on a detailed description of various aspects of the real execution environment (topology of the system, deployed services, etc.). Consequently, the generated correlation rules are tightly linked to the characteristics of the monitored information system. The proposed transformation process has been implemented in a prototype that generates correlation rules expressed in an attack description language.
引用
收藏
页码:23 / 28
页数:6
相关论文
共 50 条
  • [21] Automatic generation and evaluation of interpretable fuzzy rules
    Jäkel, J
    Gröll, L
    Mikut, R
    NEW FRONTIERS IN COMPUTATIONAL INTELLIGENCE AND ITS APPLICATIONS, 2000, 57 : 1 - 10
  • [22] Automatic generation of pragmatic and intelligible fuzzy rules
    Huang, SH
    Kothamasu, R
    Xing, H
    2001 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5: E-SYSTEMS AND E-MAN FOR CYBERNETICS IN CYBERSPACE, 2002, : 1149 - 1154
  • [23] Automatic generation of Feynman rules in the Schrodinger functional
    Takeda, Shinji
    NUCLEAR PHYSICS B, 2009, 811 (1-2) : 36 - 65
  • [24] Automatic generation of rules for a fuzzy robotic controller
    Castellano, G
    Attolico, G
    Stella, E
    Distante, A
    IROS 96 - PROCEEDINGS OF THE 1996 IEEE/RSJ INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS - ROBOTIC INTELLIGENCE INTERACTING WITH DYNAMIC WORLDS, VOLS 1-3, 1996, : 1179 - 1186
  • [25] From protocol specifications to flaws and attack scenarios: An automatic and formal algorithm
    Debbabi, M
    Mejri, M
    Tawbi, N
    Yahmadi, I
    SIXTH IEEE WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 1997, : 256 - 261
  • [26] Simulation-based automatic generation of risk scenarios
    Li, Jinghui
    Kang, Rui
    Mosleh, Ali
    Pan, Xing
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2011, 22 (03) : 437 - 444
  • [27] Simulation-based automatic generation of risk scenarios
    Ali Mosleh
    Journal of Systems Engineering and Electronics, 2011, 22 (03) : 437 - 444
  • [28] CyExec*: Automatic Generation of Randomized Cyber Range Scenarios
    Nakata, Ryotaro
    Otsuka, Akira
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 226 - 236
  • [29] Attack Detection and Identification for Automatic Generation Control Systems
    Ameli, Amir
    Hooshyar, Ali
    El-Saadany, Ehab F.
    Youssef, Amr M.
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2018, 33 (05) : 4760 - 4774
  • [30] Automatic generation of attack signatures based on sequence alignment
    Qin, Zheng
    Yin, Yi
    Chen, Fei-Yang
    Chen, Wei-Na
    Dong, Rui
    Wang, Ze-Ping
    Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 2008, 35 (06): : 77 - 81