Detail

Publication date: 1 de June, 2021

Learning Attack Sequences and Pre- and Post-Conditions for Attack Graphs

An attack graph captures the sequences of attack steps that will lead to a breach in security in a network. Traditionally attack graphs are constructed and analyzed by hand by security experts, but such graphs can also be automatically generated, provided the pre- and post-conditions of each attack step are known a priori. This process is prone to error and omissions, time consuming, and cannot respond to novel attacks that have not been pre-encoded. We will discuss a method to automatically learn attack sequences and pre- and post-conditions of attack steps from network traffic data.

Presenter

Choh Man Teng,

Date 11/11/2009
State Concluded
Host Bio Choh Man Teng joined CENTRIA in October 2009 as a senior research scientist. Her research interests include uncertain reasoning, knowledge representation, machine learning, and data mining. She received a Ph.D. in computer science from the University of Rochester.