Nothing Special   »   [go: up one dir, main page]

Anand, 2014 - Google Patents

Intrusion detection: Tools, techniques and strategies

Anand, 2014

Document ID
4152953369503313329
Author
Anand V
Publication year
Publication venue
Proceedings of the 42nd Annual ACM SIGUCCS Conference on User services

External Links

Snippet

Intrusion detection is an important aspect of modern cyber-enabled infrastructure in identifying threats to digital assets. Intrusion detection encompasses tools, techniques and strategies to recognize evolving threats thereby contributing to a secure and trustworthy …
Continue reading at dl.acm.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Similar Documents

Publication Publication Date Title
Alshamrani et al. A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities
Cazorla et al. Cyber stealth attacks in critical information infrastructures
Kagita et al. A review on cyber crimes on the internet of things
Punithavathani et al. Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence
Mwiki et al. Analysis and triage of advanced hacking groups targeting western countries critical national infrastructure: Apt28, red october, and regin
US10805343B2 (en) Network security using artificial intelligence and high speed computing
Azam et al. Defending the digital Frontier: IDPS and the battle against Cyber threat
Joshi et al. Admit-A five dimensional approach towards standardization of network and computer attack taxonomies
Möller Threats and threat intelligence
Moskal et al. Cyberattack action-intent-framework for mapping intrusion observables
Barik et al. An exploration of attack patterns and protection approaches using penetration testing
Gür et al. Security analysis of computer networks: Key concepts and methodologies
Alsmadi Cyber threat analysis
Dorbala et al. Analysis for security attacks in cyber-physical systems
US20230252138A1 (en) Cybersecurity workflow management using autodetection
Rawal et al. The basics of hacking and penetration testing
Anand Intrusion detection: Tools, techniques and strategies
Foo et al. Intrusion response systems: a survey
Waheed et al. Zero-Day Exploits in Cybersecurity: Case Studies and Countermeasure
Kujo Implementing Zero Trust Architecture for Identities and Endpoints with Microsoft tools
Jaisingh et al. Machine Learning in Cyber Threats Intelligent System
Parmar Data security, intrusion detection, database access control, policy creation and anomaly response systems-A review
Rajaallah et al. Intrusion Detection Systems: To an Optimal Hybrid Intrusion Detection System
Möller et al. Introduction to Cybersecurity
Sfetcu Advanced Persistent Threats in Cybersecurity–Cyber Warfare