Cao et al., 2015 - Google Patents
Preemptive intrusion detection: Theoretical framework and real-world measurementsCao et al., 2015
View PDF- Document ID
 - 12015964952236254160
 - Author
 - Cao P
 - Badger E
 - Kalbarczyk Z
 - Iyer R
 - Slagell A
 - Publication year
 - Publication venue
 - Proceedings of the 2015 Symposium and Bootcamp on the Science of Security
 
External Links
Snippet
This paper presents a Factor Graph based framework called AttackTagger for highly  accurate and preemptive detection of attacks, ie, before the system misuse. We use security  logs on real incidents that occurred over a six-year period at the National Center for … 
    - 238000001514 detection method 0 title abstract description 58
 
Classifications
- 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/55—Detecting local intrusion or implementing counter-measures
 - G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING; CALCULATING; COUNTING
 - G06F—ELECTRICAL DIGITAL DATA PROCESSING
 - G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
 - G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
 - G06F21/55—Detecting local intrusion or implementing counter-measures
 - G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
 
 
Similar Documents
| Publication | Publication Date | Title | 
|---|---|---|
| Cao et al. | Preemptive intrusion detection: Theoretical framework and real-world measurements | |
| Van Ede et al. | Deepcase: Semi-supervised contextual analysis of security events | |
| US11973774B2 (en) | Multi-stage anomaly detection for process chains in multi-host environments | |
| US11888870B2 (en) | Multitenant sharing anomaly cyberattack campaign detection | |
| Shen et al. | Tiresias: Predicting security events through deep learning | |
| Cheng et al. | Kairos: Practical intrusion detection and investigation using whole-system provenance | |
| US12034767B2 (en) | Artificial intelligence adversary red team | |
| Han et al. | Unicorn: Runtime provenance-based detector for advanced persistent threats | |
| US20230336581A1 (en) | Intelligent prioritization of assessment and remediation of common vulnerabilities and exposures for network nodes | |
| US20230135660A1 (en) | Educational Tool for Business and Enterprise Risk Management | |
| US11575692B2 (en) | Identity spray attack detection with adaptive classification | |
| Sharma et al. | DFA-AD: a distributed framework architecture for the detection of advanced persistent threats | |
| Thuraisingham et al. | A data driven approach for the science of cyber security: Challenges and directions | |
| Ayoade et al. | Evolving advanced persistent threat detection using provenance graph and metric learning | |
| Luh et al. | AIDIS: Detecting and classifying anomalous behavior in ubiquitous kernel processes | |
| Albasir et al. | Toward improving the security of IoT and CPS devices: An AI approach | |
| Chen et al. | Building machine learning-based threat hunting system from scratch | |
| Sharif et al. | Drsec: Flexible distributed representations for efficient endpoint security | |
| Cao | On preempting advanced persistent threats using probabilistic graphical models | |
| Jana et al. | AppMine: Behavioral analytics for web application vulnerability detection | |
| Ongun | Resilient machine learning methods for cyber-attack detection | |
| Le | Machine learning based framework for user-centered insider threat detection | |
| Thakore et al. | A quantitative methodology for security monitor deployment | |
| Roy | Towards modeling host-based data for cyber-psychological assessment in cyber threat detection | |
| Dumitrasc | Anomaly Detection Through User Behaviour Analysis |