Li et al., 2025 - Google Patents
GRIDAI: Generating and Repairing Intrusion Detection Rules via Collaboration among Multiple LLM-based AgentsLi et al., 2025
View PDF- Document ID
- 12674899394348316534
- Author
- Li J
- Chai Y
- Du L
- Duan C
- Yan H
- Gu Z
- Publication year
- Publication venue
- arXiv preprint arXiv:2510.13257
External Links
Snippet
Rule-based network intrusion detection systems play a crucial role in the real-time detection of Web attacks. However, most existing works primarily focus on automatically generating detection rules for new attacks, often overlooking the relationships between new attacks and …
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Jemal et al. | Sql injection attack detection and prevention techniques using machine learning | |
| Zipperle et al. | Provenance-based intrusion detection systems: A survey | |
| US20240414191A1 (en) | Interactive cyber-security user-interface for cybersecurity components that cooperates with a set of llms | |
| Sabir et al. | Machine learning for detecting data exfiltration: A review | |
| Bridges et al. | A survey of intrusion detection systems leveraging host data | |
| Saini et al. | A hybrid ensemble machine learning model for detecting APT attacks based on network behavior anomaly detection | |
| US10601848B1 (en) | Cyber-security system and method for weak indicator detection and correlation to generate strong indicators | |
| JP7728968B2 (en) | Systems and methods for detecting malicious hands-on keyboard activity via machine learning | |
| Laurenza et al. | Malware triage for early identification of advanced persistent threat activities | |
| Gascon et al. | Mining attributed graphs for threat intelligence | |
| WO2024039984A1 (en) | Anti-malware behavioral graph engines, systems and methods | |
| Kaur et al. | Automatic attack signature generation systems: A review | |
| Zhang et al. | An automatic assessment method of cyber threat intelligence combined with ATT&CK matrix | |
| AliAhmad et al. | Malware detection issues, future trends and challenges: a survey | |
| Zhang et al. | A survey on advanced persistent threat detection: a unified framework, challenges, and countermeasures | |
| Mehedi et al. | DySec: a machine learning-based dynamic analysis for detecting malicious packages in PyPI ecosystem | |
| US20250039242A1 (en) | Kill-chain reconstruction | |
| Durgapal et al. | Software vulnerabilities using artificial intelligence | |
| Karande et al. | Ontology based intrusion detection system for web application security | |
| Ali et al. | A comparative analysis and performance evaluation of web application protection techniques against injection attacks | |
| Li et al. | GRIDAI: Generating and Repairing Intrusion Detection Rules via Collaboration among Multiple LLM-based Agents | |
| Vijay et al. | Android-based smartphone malware exploit prevention using a machine learning-based runtime detection system | |
| Sharma et al. | Intelligent Time Series Analysis for Intrusion Detection in the Internet of Things: A Generative-Adversarial-Network-Enhanced Convolutional-Neural-Network–Long-Short-Term-Memory Framework Using Signal Features | |
| Mathew et al. | Botnet detection methods: a review and classification | |
| Puchalski et al. | Trustworthy AI-based Cyber-Attack Detector for Network Cyber Crime Forensics |