Alavizadeh et al., 2021 - Google Patents
A survey on threat situation awareness systems: framework, techniques, and insightsAlavizadeh et al., 2021
View PDF- Document ID
- 13783967901644041626
- Author
- Alavizadeh H
- Jang-Jaccard J
- Enoch S
- Al-Sahaf H
- Welch I
- Camtepe S
- Kim D
- Publication year
- Publication venue
- arXiv preprint arXiv:2110.15747
External Links
Snippet
Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats which are equipped with novel approaches to learn the system and propagate themselves, such as AI-powered threats. To debilitate these types of threats, a modern and intelligent Cyber …
- 238000000034 method 0 title abstract description 102
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Wani et al. | SDN‐based intrusion detection system for IoT using deep learning classifier (IDSIoT‐SDL) | |
| US20210273961A1 (en) | Apparatus and method for a cyber-threat defense system | |
| US11457030B2 (en) | Artificial intelligence researcher assistant for cybersecurity analysis | |
| Mijwil et al. | The significance of machine learning and deep learning techniques in cybersecurity: A comprehensive review | |
| Khraisat et al. | A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges | |
| US20230012220A1 (en) | Method for determining likely malicious behavior based on abnormal behavior pattern comparison | |
| US20210360027A1 (en) | Cyber Security for Instant Messaging Across Platforms | |
| Hindy et al. | A taxonomy of network threats and the effect of current datasets on intrusion detection systems | |
| Alavizadeh et al. | A survey on cyber situation-awareness systems: Framework, techniques, and insights | |
| Bijone | A survey on secure network: intrusion detection & prevention approaches | |
| US20230095415A1 (en) | Helper agent and system | |
| Rizvi et al. | Application of artificial intelligence to network forensics: Survey, challenges and future directions | |
| US20220360597A1 (en) | Cyber security system utilizing interactions between detected and hypothesize cyber-incidents | |
| Moustafa | Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic | |
| Punithavathani et al. | Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence | |
| Krishnapriya et al. | A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques. | |
| Alavizadeh et al. | A survey on threat situation awareness systems: framework, techniques, and insights | |
| Möller | Intrusion detection and prevention | |
| Rajasekar et al. | Security analytics | |
| Suresh et al. | Detection of malicious activities by AI-Supported Anomaly-Based IDS | |
| Verma | Enhancing Cybersecurity Through Adaptive Anomaly Detection Using Modern AI Techniques | |
| Alahmadi | Malware detection in security operation centres | |
| Möller | Intrusion detection and prevention | |
| Petersen | Detecting network intrusions | |
| Alqahtani | The detection of Advanced Persistent Threats in Software Defined Networks using Machine Learning |