[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Chen et al., 2014 - Google Patents

A model-based validated autonomic approach to self-protect computing systems

Chen et al., 2014

View PDF
Document ID
7695863384679145433
Author
Chen Q
Abdelwahed S
Erradi A
Publication year
Publication venue
IEEE Internet of things Journal

External Links

Snippet

This paper introduces an autonomic model-based cyber security management approach for the Internet of Things (IoT) ecosystems. The approach aims at realizing a self-protecting system, which has the ability to autonomously estimate, detect, and react to cyber attacks at …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Similar Documents

Publication Publication Date Title
Chen et al. A model-based validated autonomic approach to self-protect computing systems
Alshamrani et al. A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities
Bijone A survey on secure network: intrusion detection & prevention approaches
Bhatt et al. Towards a framework to detect multi-stage advanced persistent threats attacks
Kaur et al. A survey on zero-day polymorphic worm detection techniques
US9060017B2 (en) System for detecting, analyzing, and controlling infiltration of computer and network systems
Vukalović et al. Advanced persistent threats-detection and defense
Chen et al. A model-based approach to self-protection in computing system
Chiba et al. A survey of intrusion detection systems for cloud computing environment
US10805343B2 (en) Network security using artificial intelligence and high speed computing
Zouhair et al. A review of intrusion detection systems in cloud computing
Veprytska et al. AI powered attacks against AI powered protection: Classification, scenarios and risk analysis
Meier et al. Towards an AI-powered Player in Cyber Defence Exercises
Hamid et al. Cyber Security: Analysis for Detection and Removal of Zero-Day Attacks (ZDA)
Anand Intrusion detection: Tools, techniques and strategies
Kim et al. Adaptive pattern mining model for early detection of botnet‐propagation scale
Venkataramana et al. Multi-agent intrusion detection and prevention system for cloud environment
Sandhu et al. A study of the novel approaches used in intrusion detection and prevention systems
Singh et al. A survey on Malware, Botnets and their detection
De La Peña Montero et al. Autonomic and integrated management for proactive cyber security (AIM-PSC)
Krishnapriya et al. A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques.
Awodele Simon et al. Intrusion Detection System in Cloud Computing: A
Gomathi et al. Identification of Network Intrusion in Network Security by Enabling Antidote Selection
Mihanjo et al. Isolation of DDoS Attacks and Flash Events in Internet Traffic Using Deep Learning Techniques
Banerjee Detection and behavioral analysis of botnets using honeynets and classification techniques