Krüger, 2022 - Google Patents
An Approach to Profiler Detection of Cyber Attacks using Case-based Reasoning.Krüger, 2022
View PDF- Document ID
- 16085397796369684951
- Author
- Krüger M
- Publication year
- Publication venue
- LWDA
External Links
Snippet
Cyber attacks not only have an enormous economic damage potential for companies and authorities, but also represent a high risk in the area of critical infrastructures. It is therefore necessary to develop new procedures that enable the profiling of cyber attacks, also with …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30784—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Arshad et al. | Evidence collection and forensics on social networks: Research challenges and directions | |
Chen et al. | Crime data mining: a general framework and some examples | |
Amato et al. | Analyse digital forensic evidences through a semantic-based methodology and NLP techniques | |
Mohammed et al. | An automated approach for digital forensic analysis of heterogeneous big data | |
CN106650799B (en) | A kind of electronic evidence classification extracting method and system | |
Sivasangari et al. | Isolating rumors using sentiment analysis | |
Bose | A comparative study of social networking approaches in identifying the covert nodes | |
Jones et al. | Vanity fair: privacy in querylog bundles | |
Varol et al. | Review of evidence analysis and reporting phases in digital forensics process | |
Gong et al. | Model uncertainty based annotation error fixing for web attack detection | |
KR20210083510A (en) | Crime detection system through fake news decision and web monitoring and Method thereof | |
Ferrara et al. | Context-aware knowledge extraction from legal documents through zero-shot classification | |
Krüger | An Approach to Profiler Detection of Cyber Attacks using Case-based Reasoning. | |
Schroeder et al. | Crimelink explorer: Using domain knowledge to facilitate automated crime association analysis | |
Karthika et al. | Analyzing various social networking approaches for covert networks | |
Das et al. | Realizing digital forensics as a big data challenge | |
Saha et al. | Mobile device and social media forensic analysis: impacts on cyber-crime | |
Punjabi et al. | Forensic Intelligence-Combining Artificial Intelligence with Digital Forensics | |
Sumalatha et al. | Data collection and audit logs of digital forensics in cloud | |
SalahEldeen et al. | Reading the correct history? Modeling temporal intention in resource sharing | |
Solanke | Digital forensics AI: On practicality, optimality, and interpretability of digital evidence mining techniques | |
Aljarboua et al. | Cyber-Crime Detection: Experimental Techniques Comparison Analysis | |
Karie et al. | Taxonomy for digital forensic evidence | |
Amir et al. | Crowdsourcing Cybercrimes through Online Resources | |
Verma et al. | New Approach of Artificial Intelligence in Digital Forensic Investigation: A Literature Review |