Anand, 2014 - Google Patents
Intrusion detection: Tools, techniques and strategiesAnand, 2014
- Document ID
- 4152953369503313329
- Author
- Anand V
- Publication year
- Publication venue
- Proceedings of the 42nd Annual ACM SIGUCCS Conference on User services
External Links
Snippet
Intrusion detection is an important aspect of modern cyber-enabled infrastructure in identifying threats to digital assets. Intrusion detection encompasses tools, techniques and strategies to recognize evolving threats thereby contributing to a secure and trustworthy …
- 238000001514 detection method 0 title abstract description 69
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alshamrani et al. | A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities | |
Cazorla et al. | Cyber stealth attacks in critical information infrastructures | |
Kagita et al. | A review on cyber crimes on the internet of things | |
Punithavathani et al. | Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence | |
Mwiki et al. | Analysis and triage of advanced hacking groups targeting western countries critical national infrastructure: Apt28, red october, and regin | |
US10805343B2 (en) | Network security using artificial intelligence and high speed computing | |
Azam et al. | Defending the digital Frontier: IDPS and the battle against Cyber threat | |
Joshi et al. | Admit-A five dimensional approach towards standardization of network and computer attack taxonomies | |
Möller | Threats and threat intelligence | |
Moskal et al. | Cyberattack action-intent-framework for mapping intrusion observables | |
Barik et al. | An exploration of attack patterns and protection approaches using penetration testing | |
Gür et al. | Security analysis of computer networks: Key concepts and methodologies | |
Alsmadi | Cyber threat analysis | |
Dorbala et al. | Analysis for security attacks in cyber-physical systems | |
US20230252138A1 (en) | Cybersecurity workflow management using autodetection | |
Rawal et al. | The basics of hacking and penetration testing | |
Anand | Intrusion detection: Tools, techniques and strategies | |
Foo et al. | Intrusion response systems: a survey | |
Waheed et al. | Zero-Day Exploits in Cybersecurity: Case Studies and Countermeasure | |
Kujo | Implementing Zero Trust Architecture for Identities and Endpoints with Microsoft tools | |
Jaisingh et al. | Machine Learning in Cyber Threats Intelligent System | |
Parmar | Data security, intrusion detection, database access control, policy creation and anomaly response systems-A review | |
Rajaallah et al. | Intrusion Detection Systems: To an Optimal Hybrid Intrusion Detection System | |
Möller et al. | Introduction to Cybersecurity | |
Sfetcu | Advanced Persistent Threats in Cybersecurity–Cyber Warfare |