[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Pecchia et al., 2014 - Google Patents

Filtering security alerts for the analysis of a production saas cloud

Pecchia et al., 2014

View PDF
Document ID
18314860697807720734
Author
Pecchia A
Cotroneo D
Ganesan R
Sarkar S
Publication year
Publication venue
2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing

External Links

Snippet

Security alerts collected under real workload conditions represent a goldmine of information to protect integrity and confidentiality of a production Cloud. Nevertheless, the volume of runtime alerts overwhelms operations teams and makes forensics hard and time consuming …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
JP6863969B2 (en) Detecting security incidents with unreliable security events
US12225042B2 (en) System and method for user and entity behavioral analysis using network topology information
US11171970B2 (en) System and method for reducing false positive security events
US11570209B2 (en) Detecting and mitigating attacks using forged authentication objects within a domain
US11570204B2 (en) Detecting and mitigating golden ticket attacks within a domain
Shen et al. {ATTACK2VEC}: Leveraging temporal word embeddings to understand the evolution of cyberattacks
Liu et al. Latte: Large-scale lateral movement detection
Oprea et al. Detection of early-stage enterprise infection by mining large-scale log data
Pecchia et al. Filtering security alerts for the analysis of a production saas cloud
US10728264B2 (en) Characterizing behavior anomaly analysis performance based on threat intelligence
Cheng et al. Kairos: Practical intrusion detection and investigation using whole-system provenance
US11995593B2 (en) Adaptive enterprise risk evaluation
Singh et al. Collaborative ids framework for cloud
Cotroneo et al. Automated root cause identification of security alerts: Evaluation in a SaaS Cloud
Ahmed et al. Detecting Computer Intrusions Using Behavioral Biometrics.
Krishnaveni et al. Ensemble approach for network threat detection and classification on cloud computing
Kwon et al. Self-similarity based lightweight intrusion detection method for cloud computing
Paudice et al. An experiment with conceptual clustering for the analysis of security alerts
Maske et al. Advanced anomaly intrusion detection technique for host based system using system call patterns
EP3794481A1 (en) Creation and verification of behavioral baselines for the detection of cybersecurity anomalies using machine learning techniques
Holm et al. Success rate of remote code execution attacks: expert assessments and observations
Xu et al. Understanding and bridging the gap between unsupervised network representation learning and security analytics
Kadam et al. An enhanced approach for intrusion detection in virtual network of cloud computing
Ongun Resilient machine learning methods for cyber-attack detection
Kalutarage Effective monitoring of slow suspicious activites on computer networks.