A review of recent approaches on wrapper feature selection for intrusion detection

J Maldonado, MC Riff, B Neveu - Expert Systems with Applications, 2022 - Elsevier
In this paper, we present a review of recent advances in wrapper feature selection
techniques for attack detection and classification, applied in intrusion detection area. Due to …

Alert-driven attack graph generation using s-pdfa

A Nadeem, S Verwer, S Moskal… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific
to a network under observation. Such CTI currently requires extensive expert input for …

Cybersecurity: trends, issues, and challenges

K Cabaj, Z Kotulski, B Księżopolski… - EURASIP Journal on …, 2018 - Springer
In today's Internet-connected world where technologies underpin almost every facet of our
society, cybersecurity and forensic specialists are increasingly dealing with wide ranging …

Captain: community-based advanced persistent threat analysis in it networks

AA Ramaki, A Ghaemi-Bafghi… - International Journal of …, 2023 - Elsevier
Organizations that possess valuable information assets and critical infrastructure are prone
to Advanced Persistent Threats (APTs). The life cycle of this type of modern attack consists of …

Enabling visual analytics via alert-driven attack graphs

A Nadeem, S Verwer, S Moskal, SJ Yang - Proceedings of the 2021 …, 2021 - dl.acm.org
Attack graphs (AG) are a popular area of research that display all the paths an attacker can
exploit to penetrate a network. Existing techniques for AG generation rely heavily on expert …

[HTML][HTML] An anomaly behavior characterization method of network traffic based on Spatial Pyramid Pool (SPP)

T Yi, X Chen, Q Li, Y Zhu - Computers & Security, 2024 - Elsevier
APT attacks have the characteristics of low frequency, stealth, and persistence. Achieving
attack objectives and preventing trace-back often involve diverse tactics, various tools, and …

A systematic literature review for APT detection and Effective Cyber Situational Awareness (ECSA) conceptual model

DT Salim, MM Singh, P Keikhosrokiani - Heliyon, 2023 - cell.com
Advancements in computing technology and the growing number of devices (eg, computers,
mobile) connected to networks have contributed to an increase in the amount of data …

For a refoundation of Artificial Immune System research: AIS is a Design Pattern

P Parrend, F Guigou, J Navarro… - … symposium series on …, 2018 - ieeexplore.ieee.org
Despite the rich research efforts and the expressive power of existing Artificial Immune
System models, the community is struggling to devise operational tools that go …

Heterogeneous Event Causal Dependency Definition for the Detection and Explanation of Multi-Step Attacks

C Xosanavongsa - 2020 - theses.hal.science
Knowing that a persistent attacker will eventually succeed in gaining a foothold inside the
targeted network despite prevention mechanisms, it is mandatory to perform security …

[BOOK][B] HeAt PATRL: Network-Agnostic Cyber Attack Campaign Triage with Pseudo-Active Transfer Learning

SF Moskal - 2021 - search.proquest.com
Abstract SOC (Security Operation Center) analysts historically struggled to keep up with the
growing sophistication and daily prevalence of cyber attackers. To aid in the detection of …