+

Yeboah-Ofori et al., 2021 - Google Patents

Cyber threat predictive analytics for improving cyber supply chain security

Yeboah-Ofori et al., 2021

View PDF
Document ID
16847241474319417466
Author
Yeboah-Ofori A
Islam S
Lee S
Shamszaman Z
Muhammad K
Altaf M
Al-Rakhami M
Publication year
Publication venue
IEEE Access

External Links

Snippet

Cyber Supply Chain (CSC) system is complex which involves different sub-systems performing various tasks. Security in supply chain is challenging due to the inherent vulnerabilities and threats from any part of the system which can be exploited at any point …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Similar Documents

Publication Publication Date Title
Yeboah-Ofori et al. Cyber threat predictive analytics for improving cyber supply chain security
Mohammed Transforming SOC Operations: Harnessing the Power of AI and ML for Enhanced Threat Detection
US12153682B2 (en) Cyber threat scoring, cyber security training and proactive defense by machine and human agents incentivized with digital assets
Sunkara AI Powered Threat Detection in Cybersecurity
Rajagopal et al. Adopting artificial intelligence in ITIL for information security management—way forward in industry 4.0
Hidayat et al. A comprehensive cybersecurity maturity study for nonbank financial institution
Tyagi et al. Artificial Intelligence‐Based Cyber Security and Digital Forensics: A Review
Cinar Cyber threat intelligence: Current trends and future perspectives
Dahj Mastering Cyber Intelligence
Al-Sanjary et al. Challenges on digital cyber-security and network forensics: a survey
Ozkaya Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices (English Edition)
Albanese et al. Formation of awareness
Cinar A Study on Cyber Threat Intelligence Based on Current Trends and Future Perspectives
Ashraf et al. AI and Cyber Laws
Kolhar Future Trends and Innovation in Machine Intelligence for Cyber Risk Management
Kure An Integrated Cybersecurity Risk Management (I-CSRM) framework for critical infrastructure protection
Pournouri et al. Improving cyber situational awareness through data mining and predictive analytic techniques
Lier et al. An iterative five-phase process model to successfully implement AI for cybersecurity in a corporate environment
Howes et al. Enabling trustworthy spaces via orchestrated analytical security
Enberg Behavior Analytics in Cyber Security
Alguliyev et al. CTI Challenges and Perspectives as a Comprehensive Approach to Cyber Resilience
Lee A Comprehensive Analysis of Challenges and Strategies in Enhancing Cyber Security for the Defense Industry
Shibghatullah et al. AI-Enhanced Cybersecurity: A Comprehensive Review of Techniques and Challenges
De Vries et al. Towards a roadmap for development of intelligent data analysis based cyber attack detection systems
Castleberry et al. Attack Scenarios Relating to Army Facility-Related Control Systems: Quantifying the Cost to Secure and Cost Savings of the Army’s FRCS Program
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载