[go: up one dir, main page]

Alavizadeh et al., 2021 - Google Patents

A survey on threat situation awareness systems: framework, techniques, and insights

Alavizadeh et al., 2021

View PDF
Document ID
13783967901644041626
Author
Alavizadeh H
Jang-Jaccard J
Enoch S
Al-Sahaf H
Welch I
Camtepe S
Kim D
Publication year
Publication venue
arXiv preprint arXiv:2110.15747

External Links

Snippet

Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats which are equipped with novel approaches to learn the system and propagate themselves, such as AI-powered threats. To debilitate these types of threats, a modern and intelligent Cyber …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Similar Documents

Publication Publication Date Title
Wani et al. SDN‐based intrusion detection system for IoT using deep learning classifier (IDSIoT‐SDL)
US20210273961A1 (en) Apparatus and method for a cyber-threat defense system
US11457030B2 (en) Artificial intelligence researcher assistant for cybersecurity analysis
Mijwil et al. The significance of machine learning and deep learning techniques in cybersecurity: A comprehensive review
Khraisat et al. A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
US20230012220A1 (en) Method for determining likely malicious behavior based on abnormal behavior pattern comparison
US20210360027A1 (en) Cyber Security for Instant Messaging Across Platforms
Hindy et al. A taxonomy of network threats and the effect of current datasets on intrusion detection systems
Alavizadeh et al. A survey on cyber situation-awareness systems: Framework, techniques, and insights
Bijone A survey on secure network: intrusion detection & prevention approaches
US20230095415A1 (en) Helper agent and system
Rizvi et al. Application of artificial intelligence to network forensics: Survey, challenges and future directions
US20220360597A1 (en) Cyber security system utilizing interactions between detected and hypothesize cyber-incidents
Moustafa Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic
Punithavathani et al. Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence
Krishnapriya et al. A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques.
Alavizadeh et al. A survey on threat situation awareness systems: framework, techniques, and insights
Möller Intrusion detection and prevention
Rajasekar et al. Security analytics
Suresh et al. Detection of malicious activities by AI-Supported Anomaly-Based IDS
Verma Enhancing Cybersecurity Through Adaptive Anomaly Detection Using Modern AI Techniques
Alahmadi Malware detection in security operation centres
Möller Intrusion detection and prevention
Petersen Detecting network intrusions
Alqahtani The detection of Advanced Persistent Threats in Software Defined Networks using Machine Learning