Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection.
Sutanu Kumar GhoshKiavash SatvatRigel GjomemoV. N. VenkatakrishnanPublished in: ICISS (2022)
Keyphrases
- attack detection
- detection mechanism
- countermeasures
- alert correlation
- malicious attacks
- detection algorithm
- automatic detection
- object detection
- correlation coefficient
- secret key
- highly correlated
- distributed denial of service attacks
- normal traffic
- network attacks
- denial of service attacks
- activity patterns
- neural network
- false positives
- intrusion detection
- anomaly detection
- distance measure
- co occurrence
- similarity measure