Techniques for cyber-attack event log fabrication
Systems for generating attack event logs are disclosed. An example system includes a storage device for storing an event log template. The system also includes a processor to receive a selection of the event log template, and receive an attack description comprising user instructions to fabricate sy...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
12.03.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Systems for generating attack event logs are disclosed. An example system includes a storage device for storing an event log template. The system also includes a processor to receive a selection of the event log template, and receive an attack description comprising user instructions to fabricate synthetic log entries according to a format defined in the event log template. The attack description includes variables and rules for determining values for the variables. The processor generates the attack event log by determining values that satisfy the rules and writing the values into selected fields of the event log template. |
---|---|
Bibliography: | Application Number: US201916532519 |