A review of recent approaches on wrapper feature selection for intrusion detection
In this paper, we present a review of recent advances in wrapper feature selection
techniques for attack detection and classification, applied in intrusion detection area. Due to …
techniques for attack detection and classification, applied in intrusion detection area. Due to …
Alert-driven attack graph generation using s-pdfa
Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific
to a network under observation. Such CTI currently requires extensive expert input for …
to a network under observation. Such CTI currently requires extensive expert input for …
Cybersecurity: trends, issues, and challenges
In today's Internet-connected world where technologies underpin almost every facet of our
society, cybersecurity and forensic specialists are increasingly dealing with wide ranging …
society, cybersecurity and forensic specialists are increasingly dealing with wide ranging …
Captain: community-based advanced persistent threat analysis in it networks
AA Ramaki, A Ghaemi-Bafghi… - International Journal of …, 2023 - Elsevier
Organizations that possess valuable information assets and critical infrastructure are prone
to Advanced Persistent Threats (APTs). The life cycle of this type of modern attack consists of …
to Advanced Persistent Threats (APTs). The life cycle of this type of modern attack consists of …
Enabling visual analytics via alert-driven attack graphs
Attack graphs (AG) are a popular area of research that display all the paths an attacker can
exploit to penetrate a network. Existing techniques for AG generation rely heavily on expert …
exploit to penetrate a network. Existing techniques for AG generation rely heavily on expert …
[HTML][HTML] An anomaly behavior characterization method of network traffic based on Spatial Pyramid Pool (SPP)
T Yi, X Chen, Q Li, Y Zhu - Computers & Security, 2024 - Elsevier
APT attacks have the characteristics of low frequency, stealth, and persistence. Achieving
attack objectives and preventing trace-back often involve diverse tactics, various tools, and …
attack objectives and preventing trace-back often involve diverse tactics, various tools, and …
A systematic literature review for APT detection and Effective Cyber Situational Awareness (ECSA) conceptual model
Advancements in computing technology and the growing number of devices (eg, computers,
mobile) connected to networks have contributed to an increase in the amount of data …
mobile) connected to networks have contributed to an increase in the amount of data …
For a refoundation of Artificial Immune System research: AIS is a Design Pattern
Despite the rich research efforts and the expressive power of existing Artificial Immune
System models, the community is struggling to devise operational tools that go …
System models, the community is struggling to devise operational tools that go …
Heterogeneous Event Causal Dependency Definition for the Detection and Explanation of Multi-Step Attacks
C Xosanavongsa - 2020 - theses.hal.science
Knowing that a persistent attacker will eventually succeed in gaining a foothold inside the
targeted network despite prevention mechanisms, it is mandatory to perform security …
targeted network despite prevention mechanisms, it is mandatory to perform security …
[BOOK][B] HeAt PATRL: Network-Agnostic Cyber Attack Campaign Triage with Pseudo-Active Transfer Learning
SF Moskal - 2021 - search.proquest.com
Abstract SOC (Security Operation Center) analysts historically struggled to keep up with the
growing sophistication and daily prevalence of cyber attackers. To aid in the detection of …
growing sophistication and daily prevalence of cyber attackers. To aid in the detection of …