[go: up one dir, main page]

Cao et al., 2015 - Google Patents

Preemptive intrusion detection: Theoretical framework and real-world measurements

Cao et al., 2015

View PDF
Document ID
12015964952236254160
Author
Cao P
Badger E
Kalbarczyk Z
Iyer R
Slagell A
Publication year
Publication venue
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security

External Links

Snippet

This paper presents a Factor Graph based framework called AttackTagger for highly accurate and preemptive detection of attacks, ie, before the system misuse. We use security logs on real incidents that occurred over a six-year period at the National Center for …
Continue reading at assured-cloud-computing.illinois.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Similar Documents

Publication Publication Date Title
Cao et al. Preemptive intrusion detection: Theoretical framework and real-world measurements
Van Ede et al. Deepcase: Semi-supervised contextual analysis of security events
US11973774B2 (en) Multi-stage anomaly detection for process chains in multi-host environments
Shen et al. Tiresias: Predicting security events through deep learning
US11888870B2 (en) Multitenant sharing anomaly cyberattack campaign detection
Han et al. Unicorn: Runtime provenance-based detector for advanced persistent threats
Cheng et al. Kairos: Practical intrusion detection and investigation using whole-system provenance
US20240333763A1 (en) Artificial intelligence adversary red team
US20230336581A1 (en) Intelligent prioritization of assessment and remediation of common vulnerabilities and exposures for network nodes
US20230135660A1 (en) Educational Tool for Business and Enterprise Risk Management
Sharma et al. DFA-AD: a distributed framework architecture for the detection of advanced persistent threats
US11575692B2 (en) Identity spray attack detection with adaptive classification
Thuraisingham et al. A data driven approach for the science of cyber security: Challenges and directions
Ayoade et al. Evolving advanced persistent threat detection using provenance graph and metric learning
Jang et al. Mal‐Netminer: Malware Classification Approach Based on Social Network Analysis of System Call Graph
Chen et al. Building machine learning-based threat hunting system from scratch
Albasir et al. Toward improving the security of IoT and CPS devices: An AI approach
Sharif et al. Drsec: Flexible distributed representations for efficient endpoint security
Annamalai et al. Fp-fed: privacy-preserving federated detection of browser fingerprinting
Cao On preempting advanced persistent threats using probabilistic graphical models
Jana et al. AppMine: Behavioral analytics for web application vulnerability detection
Ongun Resilient machine learning methods for cyber-attack detection
Le Machine learning based framework for user-centered insider threat detection
Thakore et al. A quantitative methodology for security monitor deployment
Roy Towards modeling host-based data for cyber-psychological assessment in cyber threat detection