Skip to main content
Log in

Attack tree-based approach for real-time security event processing

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

This paper presents an approach to analytical attack modeling in near real-time information security systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Kotenko, I. and Stepashkin, M., Network security evaluation based on simulation of malefactor’s behavior, SECRYPT 2006. International Conference on Security and Cryptography. Proceedings, 2006, pp. 339–344.

    Google Scholar 

  2. Kotenko, I.V., Stepashkin, M.V., and Bogdanov, V.S., Architectures and models of active security analysis components on the basis of imitation of actions of intruders, Probl. Inf. Bezop., Komp. Sist., 2006, no. 2, pp. 7–24.

    Google Scholar 

  3. Kotenko, I. and Chechulin, A., Common framework for attack modeling and security evaluation in SIEM systems, IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing, Besancon, 2012, pp. 94–101.

    Google Scholar 

  4. Kotenko, I. and Chechulin, A., A cyber attack modeling and impact assessment framework, 5th International Conference on Cyber Conflict 2013 (CyCon 2013). Proceedings. IEEE and NATO COE Publications, 2013, Tallinn, 2013, pp. 119–142.

    Google Scholar 

  5. Kotenko, I. and Chechulin, A., Attack modeling and security evaluation in SIEM systems, Int. Trans. Syst. Sci. Appl., vol. 8, 2012, pp. 129–147.

    Google Scholar 

  6. Gerevini, A. and Serina, I., Fast plan adaptation through planning graphs: Local and systematic search techniques, Proceedings of the international conference on artificial intelligence planning and scheduling (AIPS), 2000, pp. 112–121.

    Google Scholar 

  7. Hawes, N., An anytime planning agent for computer game worlds, Proceedings of the Workshop on Agents in Computer Games at the 3rd International Conference on Computers and Games (CG'02), 2002.

    Google Scholar 

  8. Grubb, A., Anytime prediction: Efficient ensemble methods for any computational budget, Doctoral Dissertation, Robotics Institute, Carnegie Mellon University, 2014.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to I. V. Kotenko.

Additional information

Original Russian Text © A.A. Chechulin, I.V. Kotenko, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chechulin, A.A., Kotenko, I.V. Attack tree-based approach for real-time security event processing. Aut. Control Comp. Sci. 49, 701–704 (2015). https://doi.org/10.3103/S0146411615080052

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411615080052

Keywords

Navigation