Tari et al., 2023 - Google Patents
Data Exfiltration threats and prevention techniques: Machine Learning and memory-based data securityTari et al., 2023
- Document ID
- 13744946205422912178
- Author
- Tari Z
- Sohrabi N
- Samadi Y
- Suaboot J
- Publication year
External Links
Snippet
DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identification and prevention Data Exfiltration Threats and …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Oz et al. | A survey on ransomware: Evolution, taxonomy, and defense solutions | |
Moussaileb et al. | A survey on windows-based ransomware taxonomy and detection mechanisms | |
Sudhakar et al. | An emerging threat Fileless malware: a survey and research challenges | |
Chumachenko | Machine learning methods for malware detection and classification | |
Kara | Fileless malware threats: Recent advances, analysis approach through memory forensics and research challenges | |
Herr | PrEP: A framework for malware & cyber weapons | |
Hassan | Ransomware revealed | |
Grégio et al. | Toward a taxonomy of malware behaviors | |
Radhakrishnan et al. | A survey of zero-day malware attacks and its detection methodology | |
Tchakounté et al. | LimonDroid: a system coupling three signature-based schemes for profiling Android malware | |
Sabharwal et al. | Ransomware attack: India issues red alert | |
Chayal et al. | A review on spreading and forensics analysis of windows-based ransomware | |
Adebayo et al. | Malware detection, supportive software agents and its classification schemes | |
Yadav et al. | A review on malware analysis for iot and android system | |
Kazoleas et al. | A novel malicious remote administration tool using stealth and self-defense techniques | |
Tari et al. | Data Exfiltration threats and prevention techniques: Machine Learning and memory-based data security | |
Gupta et al. | Developing a blockchain-based and distributed database-oriented multi-malware detection engine | |
Ferdous et al. | Malware resistant data protection in hyper-connected networks: A survey | |
Tyagi et al. | Artificial Intelligence for Malware Analysis: A Systematic Study | |
Yadav et al. | A complete study on malware types and detecting ransomware using API calls | |
Moussaileb | Log analysis for malicious software detection | |
Yadav et al. | Malware techniques and its effect: A survey | |
Salem et al. | A sample proposal enhancing the security of the cloud computing system through deep learning and data mining | |
Sarath et al. | Malware Forensics Analysis and Detection in Cyber Physical Systems | |
Suraneni | Malware Detection and Analysis |