True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center.
Limin YangZhi ChenChenkai WangZhenning ZhangSushruth BoomaPhuong CaoConstantin AdamAlexander WithersZbigniew KalbarczykRavishankar K. IyerGang WangPublished in: USENIX Security Symposium (2024)
Keyphrases
- attack scenarios
- security measures
- cyber attacks
- intrusion detection
- intrusion detection system
- denial of service attacks
- fault injection
- network attacks
- countermeasures
- dos attacks
- attack detection
- buffer overflow
- denial of service
- alert correlation
- security threats
- malicious nodes
- attack graphs
- network intrusion
- security risks
- network security
- network administrators
- security problems
- security management
- cyber security
- ddos attacks
- computer networks
- security vulnerabilities
- intrusion prevention
- java card
- security mechanisms
- information security
- malicious users
- traffic analysis
- network traffic
- anomaly detection
- malicious traffic
- malicious attacks
- forensic analysis
- network management
- security policies
- wireless sensor networks
- malicious activities
- end hosts
- data corruption
- computer security
- network nodes
- detecting malicious
- intrusion detection and prevention