Abstract
This paper presents an approach to analytical attack modeling in near real-time information security systems.
Similar content being viewed by others
References
Kotenko, I. and Stepashkin, M., Network security evaluation based on simulation of malefactor’s behavior, SECRYPT 2006. International Conference on Security and Cryptography. Proceedings, 2006, pp. 339–344.
Kotenko, I.V., Stepashkin, M.V., and Bogdanov, V.S., Architectures and models of active security analysis components on the basis of imitation of actions of intruders, Probl. Inf. Bezop., Komp. Sist., 2006, no. 2, pp. 7–24.
Kotenko, I. and Chechulin, A., Common framework for attack modeling and security evaluation in SIEM systems, IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing, Besancon, 2012, pp. 94–101.
Kotenko, I. and Chechulin, A., A cyber attack modeling and impact assessment framework, 5th International Conference on Cyber Conflict 2013 (CyCon 2013). Proceedings. IEEE and NATO COE Publications, 2013, Tallinn, 2013, pp. 119–142.
Kotenko, I. and Chechulin, A., Attack modeling and security evaluation in SIEM systems, Int. Trans. Syst. Sci. Appl., vol. 8, 2012, pp. 129–147.
Gerevini, A. and Serina, I., Fast plan adaptation through planning graphs: Local and systematic search techniques, Proceedings of the international conference on artificial intelligence planning and scheduling (AIPS), 2000, pp. 112–121.
Hawes, N., An anytime planning agent for computer game worlds, Proceedings of the Workshop on Agents in Computer Games at the 3rd International Conference on Computers and Games (CG'02), 2002.
Grubb, A., Anytime prediction: Efficient ensemble methods for any computational budget, Doctoral Dissertation, Robotics Institute, Carnegie Mellon University, 2014.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © A.A. Chechulin, I.V. Kotenko, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.
About this article
Cite this article
Chechulin, A.A., Kotenko, I.V. Attack tree-based approach for real-time security event processing. Aut. Control Comp. Sci. 49, 701–704 (2015). https://doi.org/10.3103/S0146411615080052
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411615080052