Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios

被引:0
|
作者
Godefroy, Erwan [1 ,2 ,3 ]
Totel, Eric [2 ]
Hurfin, Michel [3 ]
Majorczyk, Frederic [1 ]
机构
[1] DGA MI, Bruz, France
[2] Supelec, Rennes, France
[3] Inria, Rennes, France
关键词
Security and Protection; Intrusion detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In large distributed information systems, alert correlation systems are necessary to handle the huge amount of elementary security alerts and to identify complex multi-step attacks within the flow of low level events and alerts. In this paper, we show that, once a human expert has provided an action tree derived from an attack tree, a fully automated transformation process can generate exhaustive correlation rules that would be tedious and error prone to enumerate by hand. The transformation relies on a detailed description of various aspects of the real execution environment (topology of the system, deployed services, etc.). Consequently, the generated correlation rules are tightly linked to the characteristics of the monitored information system. The proposed transformation process has been implemented in a prototype that generates correlation rules expressed in an attack description language.
引用
收藏
页码:23 / 28
页数:6
相关论文
共 50 条
  • [41] "Survey: Automatic generation of attack trees and attack graphs" (vol 137, 103602, 2024)
    Konsta, Alyzia-Maria
    Lafuente, Alberto Lluch
    Spiga, Beatrice
    Dragoni, Nicola
    COMPUTERS & SECURITY, 2024, 138
  • [42] Automatic generation of accident scenarios in domain specific chemical plants
    Kim, D
    Moon, I
    Lee, Y
    Yoon, D
    JOURNAL OF LOSS PREVENTION IN THE PROCESS INDUSTRIES, 2003, 16 (02) : 121 - 132
  • [43] Combined Correlation Rules to Detect Skin based on Dynamic Color Clustering
    Dias Faria, Rodrigo Augusto
    Hirata Jr, Roberto
    PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER VISION, IMAGING AND COMPUTER GRAPHICS THEORY AND APPLICATIONS (VISIGRAPP 2018), VOL 5: VISAPP, 2018, : 309 - 316
  • [44] Automatic grid generation for complex geometries
    Smith, RJ
    Leschziner, MA
    AERONAUTICAL JOURNAL, 1996, 100 (991): : 7 - 14
  • [45] Examining indicators of complex network vulnerability across diverse attack scenarios
    Ahmad F. Al Musawi
    Satyaki Roy
    Preetam Ghosh
    Scientific Reports, 13
  • [46] Examining indicators of complex network vulnerability across diverse attack scenarios
    Al Musawi, Ahmad F.
    Roy, Satyaki
    Ghosh, Preetam
    SCIENTIFIC REPORTS, 2023, 13 (01)
  • [47] An automatic unsupervised complex event processing rules generation architecture for real-time IoT attacks detection
    Roldan-Gomez, Jose
    del Rincon, Jesus Martinez
    Boubeta-Puig, Juan
    Martinez, Jose Luis
    WIRELESS NETWORKS, 2024, 30 (06) : 5127 - 5144
  • [48] Research on Automatic Generation and Analysis Technology of Network Attack Graph
    Hu, Wenhui
    Zhang, Long
    Liu, Xueyang
    Huang, Yu
    Zhang, Minghui
    Xing, Liang
    2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 133 - 139
  • [49] Automatic Attack Signature Generation Technology for Malicious Java']JavaScript
    Yoon, Soojin
    Jung, JongHun
    Noh, MyoungSun
    Chung, Kyungho
    Im, ChaeTae
    2014 PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON MODELLING, IDENTIFICATION & CONTROL (ICMIC), 2014, : 351 - 354
  • [50] An Attack Signatures Generation Sequence Alignment Algorithm Based on Production Rules
    Xue, Muhan
    Yu, Wen
    2018 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2018, : 270 - 274