This paper presents an approach to analytical attack modeling in near real-time information security systems.
This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Tax calculation will be finalised during checkout.
Kotenko, I. and Stepashkin, M., Network security evaluation based on simulation of malefactor’s behavior, SECRYPT 2006. International Conference on Security and Cryptography. Proceedings, 2006, pp. 339–344.
Kotenko, I.V., Stepashkin, M.V., and Bogdanov, V.S., Architectures and models of active security analysis components on the basis of imitation of actions of intruders, Probl. Inf. Bezop., Komp. Sist., 2006, no. 2, pp. 7–24.
Kotenko, I. and Chechulin, A., Common framework for attack modeling and security evaluation in SIEM systems, IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing, Besancon, 2012, pp. 94–101.
Kotenko, I. and Chechulin, A., A cyber attack modeling and impact assessment framework, 5th International Conference on Cyber Conflict 2013 (CyCon 2013). Proceedings. IEEE and NATO COE Publications, 2013, Tallinn, 2013, pp. 119–142.
Kotenko, I. and Chechulin, A., Attack modeling and security evaluation in SIEM systems, Int. Trans. Syst. Sci. Appl., vol. 8, 2012, pp. 129–147.
Gerevini, A. and Serina, I., Fast plan adaptation through planning graphs: Local and systematic search techniques, Proceedings of the international conference on artificial intelligence planning and scheduling (AIPS), 2000, pp. 112–121.
Hawes, N., An anytime planning agent for computer game worlds, Proceedings of the Workshop on Agents in Computer Games at the 3rd International Conference on Computers and Games (CG'02), 2002.
Grubb, A., Anytime prediction: Efficient ensemble methods for any computational budget, Doctoral Dissertation, Robotics Institute, Carnegie Mellon University, 2014.
Original Russian Text © A.A. Chechulin, I.V. Kotenko, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.
About this article
Cite this article
Chechulin, A.A., Kotenko, I.V. Attack tree-based approach for real-time security event processing. Aut. Control Comp. Sci. 49, 701–704 (2015). https://doi.org/10.3103/S0146411615080052
- attack tree
- security event
- analytical modeling
- real time