Bhatt et al., 2014 - Google Patents
Towards a framework to detect multi-stage advanced persistent threats attacksBhatt et al., 2014
View PDF- Document ID
- 604948599035413681
- Author
- Bhatt P
- Yano E
- Gustavsson P
- Publication year
- Publication venue
- 2014 IEEE 8th international symposium on service oriented system engineering
External Links
Snippet
Detecting and defending against Multi-Stage Advanced Persistent Threats (APT) Attacks is a challenge for mechanisms that are static in its nature and are based on blacklisting and malware signature techniques. Blacklists and malware signatures are designed to detect …
- 230000002085 persistent 0 title abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhatt et al. | Towards a framework to detect multi-stage advanced persistent threats attacks | |
Alshamrani et al. | A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities | |
Arivudainambi et al. | Malware traffic classification using principal component analysis and artificial neural network for extreme surveillance | |
Vukalović et al. | Advanced persistent threats-detection and defense | |
Mwiki et al. | Analysis and triage of advanced hacking groups targeting western countries critical national infrastructure: Apt28, red october, and regin | |
Chen et al. | A model-based validated autonomic approach to self-protect computing systems | |
Jadidi et al. | A threat hunting framework for industrial control systems | |
Khalid et al. | Advanced persistent threat detection: A survey | |
Kaur et al. | Efficient hybrid technique for detecting zero-day polymorphic worms | |
Park et al. | Performance evaluation of a fast and efficient intrusion detection framework for advanced persistent threat-based cyberattacks | |
Zou et al. | An approach for detection of advanced persistent threat attacks | |
Hussain et al. | Advance persistent threat—a systematic review of literature and meta-analysis of threat vectors | |
Rajput et al. | A survey on different network intrusion detection systems and countermeasure | |
Wei et al. | Comparing malware attack detection using machine learning techniques in IoT network traffic | |
Gür et al. | Security analysis of computer networks: Key concepts and methodologies | |
Alsmadi | Cyber threat analysis | |
Doukas et al. | Review of artificial intelligence cyber threat assessment techniques for increased system survivability | |
Nyakomitta et al. | A survey of data exfiltration prevention techniques | |
Rani et al. | Analysis of machine learning and deep learning intrusion detection system in Internet of Things network | |
Sfetcu | Advanced Persistent Threats in Cybersecurity–Cyber Warfare | |
Georgina et al. | Deception based techniques against ransomwares: a systematic review | |
Singh et al. | ZDAR system: defending against the unknown | |
Saini et al. | Vulnerability and Attack Detection Techniques: Intrusion Detection System | |
Kishore et al. | Intrusion Detection System a Need | |
Bhatt et al. | Analyzing Targeted Attacks using Hadoop applied to Forensic Investigation |