Recognizing Malicious Intention in an Intrusion Detection Process

@inproceedings{Cuppens2002RecognizingMI,
  title={Recognizing Malicious Intention in an Intrusion Detection Process},
  author={Fr{\'e}d{\'e}ric Cuppens and Fabien Autrel and Alexandre Mi{\`e}ge and Salem Benferhat},
  booktitle={HIS},
  year={2002}
}
Generally, theintrudermustperformseveralactions,organizedin anintrusionscenario, to achieve hisor hermaliciousobjective.Wearguethatintrusionscenarioscan bemodelledasa planningprocessandwesuggestmodellinga maliciousobjectiveas anattemptto violatea givensecurityrequirement. Our proposalis thento extendthe definitionof attackcorrelationpresentedin [CM02] to… CONTINUE READING

8 Figures & Tables

Topic

Statistics

051015'05'07'09'11'13'15'17
Citations per Year

55 Citations

Semantic Scholar estimates that this publication has 55 citations based on the available data.

See our FAQ for additional information.