Pecchia et al., 2014 - Google Patents
Filtering security alerts for the analysis of a production saas cloudPecchia et al., 2014
View PDF- Document ID
- 18314860697807720734
- Author
- Pecchia A
- Cotroneo D
- Ganesan R
- Sarkar S
- Publication year
- Publication venue
- 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing
External Links
Snippet
Security alerts collected under real workload conditions represent a goldmine of information to protect integrity and confidentiality of a production Cloud. Nevertheless, the volume of runtime alerts overwhelms operations teams and makes forensics hard and time consuming …
- 238000001914 filtration 0 title abstract description 26
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6863969B2 (en) | Detecting security incidents with unreliable security events | |
US12225042B2 (en) | System and method for user and entity behavioral analysis using network topology information | |
US11171970B2 (en) | System and method for reducing false positive security events | |
US11570209B2 (en) | Detecting and mitigating attacks using forged authentication objects within a domain | |
US11570204B2 (en) | Detecting and mitigating golden ticket attacks within a domain | |
Shen et al. | {ATTACK2VEC}: Leveraging temporal word embeddings to understand the evolution of cyberattacks | |
Liu et al. | Latte: Large-scale lateral movement detection | |
Oprea et al. | Detection of early-stage enterprise infection by mining large-scale log data | |
Pecchia et al. | Filtering security alerts for the analysis of a production saas cloud | |
US10728264B2 (en) | Characterizing behavior anomaly analysis performance based on threat intelligence | |
Cheng et al. | Kairos: Practical intrusion detection and investigation using whole-system provenance | |
US11995593B2 (en) | Adaptive enterprise risk evaluation | |
Singh et al. | Collaborative ids framework for cloud | |
Cotroneo et al. | Automated root cause identification of security alerts: Evaluation in a SaaS Cloud | |
Ahmed et al. | Detecting Computer Intrusions Using Behavioral Biometrics. | |
Krishnaveni et al. | Ensemble approach for network threat detection and classification on cloud computing | |
Kwon et al. | Self-similarity based lightweight intrusion detection method for cloud computing | |
Paudice et al. | An experiment with conceptual clustering for the analysis of security alerts | |
Maske et al. | Advanced anomaly intrusion detection technique for host based system using system call patterns | |
EP3794481A1 (en) | Creation and verification of behavioral baselines for the detection of cybersecurity anomalies using machine learning techniques | |
Holm et al. | Success rate of remote code execution attacks: expert assessments and observations | |
Xu et al. | Understanding and bridging the gap between unsupervised network representation learning and security analytics | |
Kadam et al. | An enhanced approach for intrusion detection in virtual network of cloud computing | |
Ongun | Resilient machine learning methods for cyber-attack detection | |
Kalutarage | Effective monitoring of slow suspicious activites on computer networks. |