Yeboah-Ofori et al., 2021 - Google Patents
Cyber threat predictive analytics for improving cyber supply chain securityYeboah-Ofori et al., 2021
View PDF- Document ID
- 16847241474319417466
- Author
- Yeboah-Ofori A
- Islam S
- Lee S
- Shamszaman Z
- Muhammad K
- Altaf M
- Al-Rakhami M
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
Cyber Supply Chain (CSC) system is complex which involves different sub-systems performing various tasks. Security in supply chain is challenging due to the inherent vulnerabilities and threats from any part of the system which can be exploited at any point …
- 238000010801 machine learning 0 abstract description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Yeboah-Ofori et al. | Cyber threat predictive analytics for improving cyber supply chain security | |
| Mohammed | Transforming SOC Operations: Harnessing the Power of AI and ML for Enhanced Threat Detection | |
| US12153682B2 (en) | Cyber threat scoring, cyber security training and proactive defense by machine and human agents incentivized with digital assets | |
| Sunkara | AI Powered Threat Detection in Cybersecurity | |
| Rajagopal et al. | Adopting artificial intelligence in ITIL for information security management—way forward in industry 4.0 | |
| Hidayat et al. | A comprehensive cybersecurity maturity study for nonbank financial institution | |
| Tyagi et al. | Artificial Intelligence‐Based Cyber Security and Digital Forensics: A Review | |
| Cinar | Cyber threat intelligence: Current trends and future perspectives | |
| Dahj | Mastering Cyber Intelligence | |
| Al-Sanjary et al. | Challenges on digital cyber-security and network forensics: a survey | |
| Ozkaya | Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices (English Edition) | |
| Albanese et al. | Formation of awareness | |
| Cinar | A Study on Cyber Threat Intelligence Based on Current Trends and Future Perspectives | |
| Ashraf et al. | AI and Cyber Laws | |
| Kolhar | Future Trends and Innovation in Machine Intelligence for Cyber Risk Management | |
| Kure | An Integrated Cybersecurity Risk Management (I-CSRM) framework for critical infrastructure protection | |
| Pournouri et al. | Improving cyber situational awareness through data mining and predictive analytic techniques | |
| Lier et al. | An iterative five-phase process model to successfully implement AI for cybersecurity in a corporate environment | |
| Howes et al. | Enabling trustworthy spaces via orchestrated analytical security | |
| Enberg | Behavior Analytics in Cyber Security | |
| Alguliyev et al. | CTI Challenges and Perspectives as a Comprehensive Approach to Cyber Resilience | |
| Lee | A Comprehensive Analysis of Challenges and Strategies in Enhancing Cyber Security for the Defense Industry | |
| Shibghatullah et al. | AI-Enhanced Cybersecurity: A Comprehensive Review of Techniques and Challenges | |
| De Vries et al. | Towards a roadmap for development of intelligent data analysis based cyber attack detection systems | |
| Castleberry et al. | Attack Scenarios Relating to Army Facility-Related Control Systems: Quantifying the Cost to Secure and Cost Savings of the Army’s FRCS Program |