A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

False alarm minimization techniques in signature-based intrusion detection systems: A survey

N Hubballi, V Suryanarayanan - Computer Communications, 2014 - Elsevier
A network based Intrusion Detection System (IDS) gathers and analyzes network packets
and report possible low level security violations to a system administrator. In a large network …

An empirical evaluation of the effectiveness of attack graphs and fault trees in cyber-attack perception

HS Lallie, K Debattista, J Bal - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Perceiving and understanding cyber-attacks can be a difficult task. This problem is widely
recognized and welldocumented, and more effective techniques are needed to aid cyber …

AI-assisted security alert data analysis with imbalanced learning methods

S Ndichu, T Ban, T Takahashi, D Inoue - Applied Sciences, 2023 - mdpi.com
Intrusion analysis is essential for cybersecurity, but oftentimes, the overwhelming number of
false alerts issued by security appliances can prove to be a considerable hurdle. Machine …

Intrusion alert prioritisation and attack detection using post-correlation analysis

R Shittu, A Healing, R Ghanea-Hercock… - Computers & …, 2015 - Elsevier
Event Correlation used to be a widely used technique for interpreting alert logs and
discovering network attacks. However, due to the scale and complexity of today's networks …

Sved: Scanning, vulnerabilities, exploits and detection

H Holm, T Sommestad - MILCOM 2016-2016 IEEE Military …, 2016 - ieeexplore.ieee.org
This paper presents the Scanning, Vulnerabilities, Exploits and Detection tool (SVED).
SVED facilitates reliable and repeatable cyber security experiments by providing a means to …

Prioritizing intrusion analysis using Dempster-Shafer theory

L Zomlot, SC Sundaramurthy, K Luo, X Ou… - Proceedings of the 4th …, 2011 - dl.acm.org
Intrusion analysis and incident management remains a difficult problem in practical network
security defense. The root cause of this problem is the large rate of false positives in the …

Model-driven, moving-target defense for enterprise network security

SA DeLoach, X Ou, R Zhuang, S Zhang - Models@ run. time: Foundations …, 2014 - Springer
This chapter presents the design and initial simulation results for a prototype moving-target
defense (MTD) system, whose goal is to significantly increase the difficulty of attacks on …

Evaluating practitioner cyber-security attack graph configuration preferences

HS Lallie, K Debattista, J Bal - Computers & Security, 2018 - Elsevier
Attack graphs and attack trees are a popular method of mathematically and visually
representing the sequence of events that lead to a successful cyber-attack. Despite their …

[HTML][HTML] Exploiting the outcome of outlier detection for novel attack pattern recognition on streaming data

M Heigl, E Weigelt, A Urmann, D Fiala, M Schramm - Electronics, 2021 - mdpi.com
Future-oriented networking infrastructures are characterized by highly dynamic Streaming
Data (SD) whose volume, speed and number of dimensions increased significantly over the …