I. Introduction
Security practitioners use various intrusion detection systems (IDS) to capture suspicious and/or malicious activity on a network to prevent current and future attacks. The sensors’ output, i.e., raised alerts, are meant to provide contextual information for preventive or remedial actions to alleviate financial and/or operational damages. In the ever-evolving landscape of hacker sophistication and networked systems, interpreting these alerts requires substantial expertise and research into vulnerability databases and security blogs. This leads to a potentially lengthy process to determine the meaning of the alerts and the results are often ambiguous due to the lack of documentation when alert rules are created. Compounded with the endless stream of alerts, this time-consuming process makes it difficult for security analysts to effectively assess and differentiate the intended consequences of observed malicious actions.