Kasturi, 2024 - Google Patents
Predicting Application Security Attack Paths Using Correlation Analysis, Attack Tree, and Multi-layer PerceptronKasturi, 2024
View PDF- Document ID
- 17231379406960574760
- Author
- Kasturi S
- Publication year
External Links
Snippet
The work proposed in this research is specific to application security and ties vulnerability data, data storage, statistical analysis, attack surface, attack tree, and predictive analytics as a comprehensive system for identifying attack patterns and predicting an attack path. The …
- 238000010219 correlation analysis 0 title description 35
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bodeau et al. | Cyber threat modeling: Survey, assessment, and representative framework | |
Yamin et al. | Implementation of insider threat detection system using honeypot based sensors and threat analytics | |
González-Manzano et al. | A technical characterization of APTs by leveraging public resources | |
Almagrabi et al. | Optimizing secure AI lifecycle model management with innovative generative AI strategies | |
US20230421582A1 (en) | Cybersecurity operations case triage groupings | |
Trad | Business Architecture and Transformation Projects: Enterprise Holistic Security Risk Management (ESRM) | |
Kasturi | Predicting Application Security Attack Paths Using Correlation Analysis, Attack Tree, and Multi-layer Perceptron | |
Granadillo | Optimization of cost-based threat response for Security Information and Event Management (SIEM) systems | |
Trilho | Intelligent Systems for Cyber Defence-An Architecture Framework for Cyber Defence Using Artificial Intelligence | |
Banerjee et al. | A Study on Cyber Defence Curse for Online Attackers | |
Kure | An Integrated Cybersecurity Risk Management (I-CSRM) framework for critical infrastructure protection | |
Galla et al. | AI-Driven Threat Detection: Leveraging Big Data For Advanced Cybersecurity Compliance | |
Wood | Socio-technical Security: User Behaviour, Profiling and Modelling and Privacy by Design | |
Amodu | Security Auditors' Perspective in Tackling Cyber-Threats | |
Shivakumara et al. | Review Paper on Dynamic Mechanisms of Data Leakage Detection and Prevention | |
Sharif et al. | Threat modelling with UML for cybersecurity risk management in OT-IT integrated infrastructures | |
Alabdulhadi | Information Security and Privacy in the Cloud of Healthcare Sector, and The Use of Miter Att&ck Framework to Keep the Healthcare Secure | |
Ghauri | Digital Security Versus Private Information | |
Waelchli et al. | Reducing the risk of social engineering attacks using SOAR measures in a real world environment: A case study | |
Chris et al. | The Role of AI in Enhancing Threat Detection Systems for Real-Time Cybersecurity Compliance | |
Adel | Developing a Digital Forensic Capability for Critical Infrastructures: An Investigation Framework | |
Syed | Implementing Comprehensive Security in Your Software Supply Chain | |
Vishnu | Analysis of Current Machine Learning and AI Techniques to Perform Automated Hacking | |
Engemann et al. | 10 Implications of artificial intelligence in cybersecurity for individuals | |
Olusegun | AI-Driven Cybersecurity: Addressing the Challenges of the Digital Age |