[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Bhatt et al., 2014 - Google Patents

Towards a framework to detect multi-stage advanced persistent threats attacks

Bhatt et al., 2014

View PDF
Document ID
604948599035413681
Author
Bhatt P
Yano E
Gustavsson P
Publication year
Publication venue
2014 IEEE 8th international symposium on service oriented system engineering

External Links

Snippet

Detecting and defending against Multi-Stage Advanced Persistent Threats (APT) Attacks is a challenge for mechanisms that are static in its nature and are based on blacklisting and malware signature techniques. Blacklists and malware signatures are designed to detect …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis

Similar Documents

Publication Publication Date Title
Bhatt et al. Towards a framework to detect multi-stage advanced persistent threats attacks
Alshamrani et al. A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities
Arivudainambi et al. Malware traffic classification using principal component analysis and artificial neural network for extreme surveillance
Vukalović et al. Advanced persistent threats-detection and defense
Mwiki et al. Analysis and triage of advanced hacking groups targeting western countries critical national infrastructure: Apt28, red october, and regin
Chen et al. A model-based validated autonomic approach to self-protect computing systems
Jadidi et al. A threat hunting framework for industrial control systems
Khalid et al. Advanced persistent threat detection: A survey
Kaur et al. Efficient hybrid technique for detecting zero-day polymorphic worms
Park et al. Performance evaluation of a fast and efficient intrusion detection framework for advanced persistent threat-based cyberattacks
Zou et al. An approach for detection of advanced persistent threat attacks
Hussain et al. Advance persistent threat—a systematic review of literature and meta-analysis of threat vectors
Rajput et al. A survey on different network intrusion detection systems and countermeasure
Wei et al. Comparing malware attack detection using machine learning techniques in IoT network traffic
Gür et al. Security analysis of computer networks: Key concepts and methodologies
Alsmadi Cyber threat analysis
Doukas et al. Review of artificial intelligence cyber threat assessment techniques for increased system survivability
Nyakomitta et al. A survey of data exfiltration prevention techniques
Rani et al. Analysis of machine learning and deep learning intrusion detection system in Internet of Things network
Sfetcu Advanced Persistent Threats in Cybersecurity–Cyber Warfare
Georgina et al. Deception based techniques against ransomwares: a systematic review
Singh et al. ZDAR system: defending against the unknown
Saini et al. Vulnerability and Attack Detection Techniques: Intrusion Detection System
Kishore et al. Intrusion Detection System a Need
Bhatt et al. Analyzing Targeted Attacks using Hadoop applied to Forensic Investigation