A security monitoring system processes event messages related to computer
network security in real time, evaluating inter-event constraints so as
to identify combinations of events that are partial solutions to a
predefined event correlation rule, and furthermore evaluating
combinations of the partial solutions do determine if they together
satisfy the predefined event correlation rule. A decision tree is formed
based on the rule. Event messages are categorized into groups at leaf
nodes of the tree in accordance with a plurality of intra-event
constraints, and then the messages are correlated in accordance with a
plurality of inter-event constraints at non-leaf nodes of the tree. When
the inter-event constraint at a root node of the tree has been satisfied,
a network attack alert is issued and protective actions may be taken.