Research Article
G-CAS: Greedy Algorithm-Based Security Event Correlation System for Critical Infrastructure Network
Algorithm 2
The greedy tree algorithm.
| | Require: the data of security events. | | Ensure: the security alerts with specific conditions. | | (1) | if Received a security event then | | (2) | Greedy-Tree Init the rules. | | (3) | DataSource classify. | | (4) | Key-value Event-Parse. | | (5) | LogicMatchers Generate Logic Matcher. | | (6) | fordo | | (7) | Meta-Match with tree structure. | | (8) | Optimized in the greedy tree. | | (9) | end for | | (10) | fordo | | (11) | Logical-Match based on the greedy algorithm. | | (12) | Optimized in the greedy tree. | | (13) | end for | | (14) | Frequency-Statistic. | | (15) | Threshold-Compare. | | (16) | Alert-Formed. | | (17) | end if | | (18) | return Alerts. |
|