Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Host-based intrusion detection system with system calls: Review and future trends
M Liu, Z Xue, X Xu, C Zhong, J Chen - ACM computing surveys (CSUR), 2018 - dl.acm.org
In a contemporary data center, Linux applications often generate a large quantity of real-time
system call traces, which are not suitable for traditional host-based intrusion detection …
system call traces, which are not suitable for traditional host-based intrusion detection …
A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets
In the current network-based computing world, where the number of interconnected devices
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …
Classification and analysis of malicious code detection techniques based on the APT attack
K Lee, J Lee, K Yim - Applied Sciences, 2023 - mdpi.com
According to the Fire-eye's M-Trends Annual Threat Report 2022, there are many advanced
persistent threat (APT) attacks that are currently in use, and such continuous and specialized …
persistent threat (APT) attacks that are currently in use, and such continuous and specialized …
[HTML][HTML] NLP methods in host-based intrusion detection Systems: A systematic review and future directions
Abstract Host-based Intrusion Detection System (HIDS) is an effective last line of defense for
defending against cyber security attacks after perimeter defenses (eg, Network-based …
defending against cyber security attacks after perimeter defenses (eg, Network-based …
[HTML][HTML] Green intrusion detection systems: A comprehensive review and directions
Intrusion detection systems have proliferated with varying capabilities for data generation
and learning towards detecting abnormal behavior. The goal of green intrusion detection …
and learning towards detecting abnormal behavior. The goal of green intrusion detection …
A review of the advances in cyber security benchmark datasets for evaluating data-driven based intrusion detection systems
Cybercrime has led to the loss of billions of dollars, the malfunctioning of computer systems,
the destruction of critical information, the compromising of network integrity and …
the destruction of critical information, the compromising of network integrity and …
Machine learning (in) security: A stream of problems
Machine Learning (ML) has been widely applied to cybersecurity and is considered state-of-
the-art for solving many of the open issues in that field. However, it is very difficult to evaluate …
the-art for solving many of the open issues in that field. However, it is very difficult to evaluate …
Mining trends and patterns of software vulnerabilities
Zero-day vulnerabilities continue to be a threat as they are unknown to vendors; when
attacks occur, vendors have zero days to provide remedies. New techniques for the …
attacks occur, vendors have zero days to provide remedies. New techniques for the …
Intrusion detection system for applications using linux containers
Linux containers are gaining increasing traction in both individual and industrial use, and as
these containers get integrated into mission-critical systems, real-time detection of malicious …
these containers get integrated into mission-critical systems, real-time detection of malicious …
Applying bag of system calls for anomalous behavior detection of applications in linux containers
In this paper, we present the results of using bags of system calls for learning the behavior of
Linux containers for use in anomaly-detection based intrusion detection system. By using …
Linux containers for use in anomaly-detection based intrusion detection system. By using …