Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering
暂无分享,去创建一个
Jianyi Liu | Ru Zhang | Yanyu Huo | Fangyu Weng | Jianyi Liu | Ru Zhang | Yanyu Huo | Fangyu Weng
[1] Junho Choi,et al. Abnormal behaviour pattern mining for unknown threat detection , 2017, Comput. Syst. Sci. Eng..
[2] Ping Chen,et al. A Study on Advanced Persistent Threats , 2014, Communications and Multimedia Security.
[3] Zhang Ming-hua. Research on discovering multi-step attack patterns based on clustering IDS alert sequences , 2011 .
[4] Florian Skopik,et al. Combating advanced persistent threats: From network event correlation to incident detection , 2015, Comput. Secur..
[5] Eric Michael Hutchins,et al. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains , 2010 .
[6] Kate Munro,et al. Deconstructing Flame: the limitations of traditional defences , 2012 .
[7] Li Jin,et al. A Mining Approach for Causal Knowledge in Alert Correlating Based on the Markov Property , 2014 .
[8] Colin Tankard,et al. Advanced Persistent threats and how to monitor and deter them , 2011, Netw. Secur..