Filters








49 Hits in 5.1 sec

Complementary Approaches to Instructable Agents for Advanced Persistent Threats Detection

Juan HUANG, Zhemin AN, Steven MECKL, Gheorghe TECUCI, Dorin MARCU
2020 Studies in Informatics and Control  
It then presents two complementary instantiations of this approach, as implemented in ADONIS (Automating the ATT&CK TM -based Detection Of Novel Network Intrusions System) and CAAPT (Cognitive Agent for  ...  This paper presents a novel approach to the detection of APTs (advanced persistent threats), where an expert cybersecurity analyst directly teaches (rather than programs) a cognitive agent how to investigate  ...  It is also challenging due to a lack of similar systems. It is a novel approach with respect to both autonomous evidence-based reasoning in general and APT detection in particular.  ... 
doi:10.24846/v29i3y202001 fatcat:itbotahurjeerhclvfkle6safe

Semantics-aware detection of targeted attacks: a survey

Robert Luh, Stefan Marschalek, Manfred Kaiser, Helge Janicke, Sebastian Schrittwieser
2016 Journal in Computer Virology and Hacking Techniques  
Many researchers contribute to the fight against network intrusions or malicious software by proposing novel detection systems or analysis methods.  ...  In today's interconnected digital world, targeted attacks have become a serious threat to conventional computer systems and critical infrastructure alike.  ...  The financial support by the Austrian Federal Ministry of Science, Research and Economy and the National Foundation for Research, Technology and Development is gratefully acknowledged.  ... 
doi:10.1007/s11416-016-0273-3 fatcat:flhbpc4uwbandby2adxi62t64u

Davis Mirilla Dissertation on Impact Task Disengagement in Cyber Security.pdf

Davis Mirilla
2019 Figshare  
These investments have unfortunately not created a significant impact at stopping or slowing down data breaches.  ...  Over recent decades, we have moved our workflows, record management, and communications into digital formats driven by computational algorithms that run on the global Internet infrastructure.  ...  ACKNOWLEDGEMENTS In completing this work, I want to acknowledge the support I enjoyed from members of Faculty, Seidenberg College in Pace University, members of my family, my employers and a small but  ... 
doi:10.6084/m9.figshare.9785363.v1 fatcat:po66obagnjb6jgnqaso65hybw4

Turning the Hunted into the Hunter via Threat Hunting: Life Cycle, Ecosystem, Challenges and the Great Promise of AI [article]

Caroline Hillier
2022 arXiv   pre-print
This paper is a collection of recent work that gives a holistic view of the threat hunting ecosystem, identifies challenges, and discusses the future with the integration of artificial intelligence (AI  ...  We specifically establish a life cycle and ecosystem for privacy-threat hunting in addition to identifying the related challenges. We also discovered how critical the use of AI is in threat hunting.  ...  To fight against the advanced threats a Web-APT-Detect system was created by the authors of [164] .  ... 
arXiv:2204.11076v1 fatcat:jc3bghaiungxxlta5itgjnla2a

A Survey on Cyber Situation Awareness Systems: Framework, Techniques, and Insights

Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit A. Camtepe, Dan Dongseong Kim
2022 ACM Computing Surveys  
To debilitate these types of threats, a modern and intelligent Cyber Situation Awareness (SA) system needs to be developed which has the ability of monitoring and capturing various types of threats, analyzing  ...  Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats which are equipped with novel approaches to learn the system and propagate themselves, such as AI-powered threats.  ...  ACKNOWLEDGMENTS This work was supported by the Cyber Security Research Programme-"Artificial Intelligence for Automating Response to Threats" from the Ministry of Business, Innovation, and Employment (  ... 
doi:10.1145/3530809 fatcat:cwk5bp56ere5re2frzgzox56ka

Creating Cybersecurity Knowledge Graphs from Malware After Action Reports

Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin, James Holt, Richard Zak
2020 IEEE Access  
ACKNOWLEDGMENT This work was supported by a United States Department of Defense grant, a gift from IBM research, and a National Science Foundation (NSF) grant, award number 2025685.  ...  A security analyst can use a SPARQL [46] endpoint to query over the graph and ask the system to compute answers to complex queries and scenarios (See Section IV-D).  ...  His research interests are in the broad area of networked computing and intelligent systems.  ... 
doi:10.1109/access.2020.3039234 fatcat:5ymamllt7fcf3eq5pwdle4vd5y

Emerging Cyber Security Challenges after COVID Pandemic: A Survey

Arjun Choudhary, Gaurav Choudhary, Kapil Pareek, Chetanya Kunndra, Jatin Luthra, Nicola Dragon
2022 Journal of Internet Services and Information Security  
Cybercriminals known to monetize any recent system changes took this as a golden opportunity and were ready with their new modus operandi during this pandemic.  ...  During this period, Malware attacks, Data breaches, Banking frauds, Job frauds, etc., were common.  ...  Antivirus Solutions Antivirus software is used to detect, isolate and remove malware from systems. It is a fundamental component of any endpoint security system.  ... 
doi:10.22667/jisis.2022.05.31.021 dblp:journals/jisis/ChoudharyCPKLD22 fatcat:ofqkqovmpfev7i7opgvu2mfcv4

Risk Management related to Privacy Policies of an Online Store

George Cristian Schin
2016 Risk in Contemporary Economy  
By analysing two case studies, the article proposes a framework which can guide e-commerce merchants to integrate intelligent systems for threat detection.  ...  The real time visibility to cyber-attacks empowers this intelligence tool with high capabilities to detect the threats that companies confront with.  ...  Viruses can completely destroy a computer system and disrupt the operations of the website.  ... 
doaj:88c30ab5fd1e4c009a241701ade26f4f fatcat:syviz7544vajpcz3vila4dmwoa

Using Deceptive Information in Computer Security Defenses

Mohammed H. Almeshekah, Eugene H. Spafford
2014 International Journal of Cyber Warfare and Terrorism  
Moreover, they identify the use of deceit as a useful protection technique that can significantly enhance the security of computer systems.  ...  They show that by intelligently introducing deceit in information systems, the authors not only lead attackers astray, but also give organizations the ability to detect leakage; create doubt and uncertainty  ...  In this paper we present a novel taxonomy of security mechanisms and controls that can be deployed to protect computer systems.  ... 
doi:10.4018/ijcwt.2014070105 fatcat:7bw3f3xrf5gd7fqmezl7cviaju

Machine and Deep Learning for IoT Security and Privacy: Applications, Challenges, and Future Directions

Subrato Bharati, Prajoy Podder, Jinbo Xiong
2022 Security and Communication Networks  
The integration of the Internet of Things (IoT) connects a number of intelligent devices with minimum human interference that can interact with one another.  ...  Therefore, DL/ML methods are essential to turn IoT system protection from simply enabling safe contact between IoT systems to intelligence systems in security.  ...  Fog computing-based attack detection was shown to be quicker than cloud computing-based attack detection in the experiments conducted on the Azure cloud.  ... 
doi:10.1155/2022/8951961 fatcat:n4rb7rtgrjbybmen66oyrzkhle

Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters

Una-May O'Reilly, Jamal Toutouh, Marcos Pertierra, Daniel Prado Sanchez, Anthony Erb Luogo, Jonathan Kelly, Erik Hemberg
2020 Zenodo  
Adversarial Genetic Programming for Cyber Security encompasses extant and immediate research efforts in a vital problem domain, arguably occupying a position at the frontier where GP matters.  ...  We delineate Adversarial Genetic Programming for Cyber Security, a research topic that, by means of genetic programming (GP), replicates and studies the behavior of cyber adversaries and the dynamics of  ...  This material is based upon work supported by DARPA.  ... 
doi:10.5281/zenodo.4593284 fatcat:mpwyc4xbhbhahlaagf44a22abe

Adversarial genetic programming for cyber security: a rising application domain where GP matters

Una-May O'Reilly, Jamal Toutouh, Marcos Pertierra, Daniel Prado Sanchez, Dennis Garcia, Anthony Erb Luogo, Jonathan Kelly, Erik Hemberg
2020 Genetic Programming and Evolvable Machines  
Adversarial Genetic Programming for Cyber Security encompasses extant and immediate research efforts in a vital problem domain, arguably occupying a position at the frontier where GP matters.  ...  We delineate Adversarial Genetic Programming for Cyber Security, a research topic that, by means of genetic programming (GP), replicates and studies the behavior of cyber adversaries and the dynamics of  ...  This material is based upon work supported by DARPA.  ... 
doi:10.1007/s10710-020-09389-y fatcat:pptcxqfc6zeptdstzl3ipewrym

Editorial: Second Quarter 2019 IEEE Communications Surveys and Tutorials

Ying-Dar Lin
2019 IEEE Communications Surveys and Tutorials  
With each day bringing new forms of malware, having new signatures and behavior that is close to normal, a single threat detection system would not suffice.  ...  The paper covers the novel strategies attackers use to perform APT attacks.  ... 
doi:10.1109/comst.2019.2913929 fatcat:j6zwztxl45cktgbz7ziudnaepi

Modeling Cyber Threat Intelligence

Siri Bromander, Morton Swimmer, Martin Eian, Geir Skjotskift, Fredrik Borg
2020 Proceedings of the 6th International Conference on Information Systems Security and Privacy  
The authors would like to thank the anonymous reviewers for valuable input that improved the paper.  ...  The authors would like to thank the anonymous reviewer for valuable input that improved the paper and the respondents of the questionnaire who contributed to this study.  ...  current local time of the victim system" is easy for a human, but very difficult for a computer.  ... 
doi:10.5220/0008875302730280 dblp:conf/icissp/BromanderSESB20 fatcat:han5vxdbpffhdnm7caoqy2ourm

CNA Tactics and Techniques: A Structure Proposal

Antonio Villalón-Huerta, Ismael Ripoll-Ripoll, Hector Marco-Gisbert
2021 Journal of Sensor and Actuator Networks  
Destructive and control operations are today a major threat for cyber physical systems.  ...  These operations, known as Computer Network Attack (CNA), and usually linked to state-sponsored actors, are much less analyzed than Computer Network Exploitation activities (CNE), those related to intelligence  ...  In the MITRE ATT&CK approach, they identify two techniques for performing DoS: those based on the endpoint and those based on the network.  ... 
doi:10.3390/jsan10010014 fatcat:y7dzsp4jkbaffgqznoparz2uzy
« Previous Showing results 1 — 15 out of 49 results