Sign in

AClog: Attack Chain Construction Based on Log Correlation.

Teng LiJianfeng MaQingqi PeiYulong ShenChi LinSiqi MaMohammad S. Obaidat
Published in: GLOBECOM (2019)
Keyphrases
  • alert correlation
  • correlation coefficient
  • attack graphs
  • database
  • website
  • search algorithm
  • lightweight
  • log files
  • highly correlated
  • countermeasures
  • secret key
  • positively correlated
  • attack graph