[go: up one dir, main page]

Li et al., 2025 - Google Patents

GRIDAI: Generating and Repairing Intrusion Detection Rules via Collaboration among Multiple LLM-based Agents

Li et al., 2025

View PDF
Document ID
12674899394348316534
Author
Li J
Chai Y
Du L
Duan C
Yan H
Gu Z
Publication year
Publication venue
arXiv preprint arXiv:2510.13257

External Links

Snippet

Rule-based network intrusion detection systems play a crucial role in the real-time detection of Web attacks. However, most existing works primarily focus on automatically generating detection rules for new attacks, often overlooking the relationships between new attacks and …
Continue reading at arxiv.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Jemal et al. Sql injection attack detection and prevention techniques using machine learning
Zipperle et al. Provenance-based intrusion detection systems: A survey
US20240414191A1 (en) Interactive cyber-security user-interface for cybersecurity components that cooperates with a set of llms
Sabir et al. Machine learning for detecting data exfiltration: A review
Bridges et al. A survey of intrusion detection systems leveraging host data
Saini et al. A hybrid ensemble machine learning model for detecting APT attacks based on network behavior anomaly detection
US10601848B1 (en) Cyber-security system and method for weak indicator detection and correlation to generate strong indicators
JP7728968B2 (en) Systems and methods for detecting malicious hands-on keyboard activity via machine learning
Laurenza et al. Malware triage for early identification of advanced persistent threat activities
Gascon et al. Mining attributed graphs for threat intelligence
WO2024039984A1 (en) Anti-malware behavioral graph engines, systems and methods
Kaur et al. Automatic attack signature generation systems: A review
Zhang et al. An automatic assessment method of cyber threat intelligence combined with ATT&CK matrix
AliAhmad et al. Malware detection issues, future trends and challenges: a survey
Zhang et al. A survey on advanced persistent threat detection: a unified framework, challenges, and countermeasures
Mehedi et al. DySec: a machine learning-based dynamic analysis for detecting malicious packages in PyPI ecosystem
US20250039242A1 (en) Kill-chain reconstruction
Durgapal et al. Software vulnerabilities using artificial intelligence
Karande et al. Ontology based intrusion detection system for web application security
Ali et al. A comparative analysis and performance evaluation of web application protection techniques against injection attacks
Li et al. GRIDAI: Generating and Repairing Intrusion Detection Rules via Collaboration among Multiple LLM-based Agents
Vijay et al. Android-based smartphone malware exploit prevention using a machine learning-based runtime detection system
Sharma et al. Intelligent Time Series Analysis for Intrusion Detection in the Internet of Things: A Generative-Adversarial-Network-Enhanced Convolutional-Neural-Network–Long-Short-Term-Memory Framework Using Signal Features
Mathew et al. Botnet detection methods: a review and classification
Puchalski et al. Trustworthy AI-based Cyber-Attack Detector for Network Cyber Crime Forensics