[go: up one dir, main page]

Stutz et al., 2024 - Google Patents

Cyber threat detection and mitigation using artificial intelligence–A cyber‐physical perspective

Stutz et al., 2024

Document ID
7202930176685194082
Author
Stutz D
de Assis J
Laghari A
Khan A
Deshpande A
Kulkarni D
Terziev A
de Jesus M
Grata E
Publication year
Publication venue
Applying artificial intelligence in cybersecurity analytics and cyber threat detection

External Links

Snippet

The complexity of an independent “cyber‐physical system”(CPS) per control, sensing, actuation, computation, and communication demands is hefty. Ongoing scalar expansion and numerous security cyber threats (CTs) arise, notably information sharing channels …
Continue reading at onlinelibrary.wiley.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/44Arrangements for executing specific programmes
    • G06F9/455Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2123Dummy operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment

Similar Documents

Publication Publication Date Title
US11347843B2 (en) Asset-based security systems and methods
US11509683B2 (en) System and method for securing a network
Onyshchenko et al. Economic cybersecurity of business in Ukraine: strategic directions and implementation mechanism
Waheed et al. Zero-day exploits in cybersecurity: Case studies and countermeasure
Ibrahim A review on the mechanism mitigating and eliminating internet crimes using modern technologies: mitigating internet crimes using modern technologies
KR20170091989A (en) System and method for managing and evaluating security in industry control network
Stutz et al. Cyber threat detection and mitigation using artificial intelligence–A cyber‐physical perspective
Rana et al. Ransomware attacks in cyber-physical systems: Countermeasure of attack vectors through automated web defenses
Yadav et al. A review on malware analysis for iot and android system
Tyagi et al. Artificial intelligence for malware analysis: A systematic study
Efe Risk modelling of cyber threats against MIS and ERP applications
Kshetri et al. algoXSSF: Detection and analysis of cross-site request forgery (XSRF) and cross-site scripting (XSS) attacks via Machine learning algorithms
Diyora et al. Blockchain or AI: Web Applications Security Mitigations
US12505209B2 (en) Cybersecurity workflow management using autodetection
Alsmadi Cyber threat analysis
Egerton et al. Applying zero trust security principles to defence mechanisms against data exfiltration attacks
Ganapathi A review of machine learning methods applied for handling zero-day attacks in the cloud environment
Uyyala Multilevel authentication system using hierarchical intrusion detection architecture for online banking
Pescatore SANS 2021 top new attacks and threat report
Adavelli et al. AI and Cybersecurity: Advancements in Threat Detection and Prevention
Gottipati A proposed cybersecurity model for cryptocurrency exchanges
Bhardwaj et al. ATP the New‐Age Threat Vector and Cyberattack Trends
Prathyusha et al. A study on cloud security issues
Akinola et al. Introduction to Cyber-security
Shyam et al. Machine vs non-machine learning approaches to cloud security solutions: a survey