Cao et al., 2015 - Google Patents
Preemptive intrusion detection: Theoretical framework and real-world measurementsCao et al., 2015
View PDF- Document ID
- 12015964952236254160
- Author
- Cao P
- Badger E
- Kalbarczyk Z
- Iyer R
- Slagell A
- Publication year
- Publication venue
- Proceedings of the 2015 Symposium and Bootcamp on the Science of Security
External Links
Snippet
This paper presents a Factor Graph based framework called AttackTagger for highly accurate and preemptive detection of attacks, ie, before the system misuse. We use security logs on real incidents that occurred over a six-year period at the National Center for …
- 238000001514 detection method 0 title abstract description 58
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cao et al. | Preemptive intrusion detection: Theoretical framework and real-world measurements | |
Van Ede et al. | Deepcase: Semi-supervised contextual analysis of security events | |
US11973774B2 (en) | Multi-stage anomaly detection for process chains in multi-host environments | |
Shen et al. | Tiresias: Predicting security events through deep learning | |
US11888870B2 (en) | Multitenant sharing anomaly cyberattack campaign detection | |
Han et al. | Unicorn: Runtime provenance-based detector for advanced persistent threats | |
Cheng et al. | Kairos: Practical intrusion detection and investigation using whole-system provenance | |
US20240333763A1 (en) | Artificial intelligence adversary red team | |
US20230336581A1 (en) | Intelligent prioritization of assessment and remediation of common vulnerabilities and exposures for network nodes | |
US20230135660A1 (en) | Educational Tool for Business and Enterprise Risk Management | |
Sharma et al. | DFA-AD: a distributed framework architecture for the detection of advanced persistent threats | |
US11575692B2 (en) | Identity spray attack detection with adaptive classification | |
Thuraisingham et al. | A data driven approach for the science of cyber security: Challenges and directions | |
Ayoade et al. | Evolving advanced persistent threat detection using provenance graph and metric learning | |
Jang et al. | Mal‐Netminer: Malware Classification Approach Based on Social Network Analysis of System Call Graph | |
Chen et al. | Building machine learning-based threat hunting system from scratch | |
Albasir et al. | Toward improving the security of IoT and CPS devices: An AI approach | |
Sharif et al. | Drsec: Flexible distributed representations for efficient endpoint security | |
Annamalai et al. | Fp-fed: privacy-preserving federated detection of browser fingerprinting | |
Cao | On preempting advanced persistent threats using probabilistic graphical models | |
Jana et al. | AppMine: Behavioral analytics for web application vulnerability detection | |
Ongun | Resilient machine learning methods for cyber-attack detection | |
Le | Machine learning based framework for user-centered insider threat detection | |
Thakore et al. | A quantitative methodology for security monitor deployment | |
Roy | Towards modeling host-based data for cyber-psychological assessment in cyber threat detection |