Techniques for cyber-attack event log fabrication

Systems for generating attack event logs are disclosed. An example system includes a storage device for storing an event log template. The system also includes a processor to receive a selection of the event log template, and receive an attack description comprising user instructions to fabricate sy...

Full description

Saved in:
Bibliographic Details
Main Authors Peleg, Nitzan, Soceanu, Omri, Blinder, Oleg
Format Patent
LanguageEnglish
Published 12.03.2024
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Systems for generating attack event logs are disclosed. An example system includes a storage device for storing an event log template. The system also includes a processor to receive a selection of the event log template, and receive an attack description comprising user instructions to fabricate synthetic log entries according to a format defined in the event log template. The attack description includes variables and rules for determining values for the variables. The processor generates the attack event log by determining values that satisfy the rules and writing the values into selected fields of the event log template.
Bibliography:Application Number: US201916532519