Nothing Special   »   [go: up one dir, main page]

Kasturi, 2024 - Google Patents

Predicting Application Security Attack Paths Using Correlation Analysis, Attack Tree, and Multi-layer Perceptron

Kasturi, 2024

View PDF
Document ID
17231379406960574760
Author
Kasturi S
Publication year

External Links

Snippet

The work proposed in this research is specific to application security and ties vulnerability data, data storage, statistical analysis, attack surface, attack tree, and predictive analytics as a comprehensive system for identifying attack patterns and predicting an attack path. The …
Continue reading at scholars.indianastate.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/01Customer relationship, e.g. warranty
    • G06Q30/018Business or product certification or verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS

Similar Documents

Publication Publication Date Title
Bodeau et al. Cyber threat modeling: Survey, assessment, and representative framework
Yamin et al. Implementation of insider threat detection system using honeypot based sensors and threat analytics
González-Manzano et al. A technical characterization of APTs by leveraging public resources
Almagrabi et al. Optimizing secure AI lifecycle model management with innovative generative AI strategies
US20230421582A1 (en) Cybersecurity operations case triage groupings
Trad Business Architecture and Transformation Projects: Enterprise Holistic Security Risk Management (ESRM)
Kasturi Predicting Application Security Attack Paths Using Correlation Analysis, Attack Tree, and Multi-layer Perceptron
Granadillo Optimization of cost-based threat response for Security Information and Event Management (SIEM) systems
Trilho Intelligent Systems for Cyber Defence-An Architecture Framework for Cyber Defence Using Artificial Intelligence
Banerjee et al. A Study on Cyber Defence Curse for Online Attackers
Kure An Integrated Cybersecurity Risk Management (I-CSRM) framework for critical infrastructure protection
Galla et al. AI-Driven Threat Detection: Leveraging Big Data For Advanced Cybersecurity Compliance
Wood Socio-technical Security: User Behaviour, Profiling and Modelling and Privacy by Design
Amodu Security Auditors' Perspective in Tackling Cyber-Threats
Shivakumara et al. Review Paper on Dynamic Mechanisms of Data Leakage Detection and Prevention
Sharif et al. Threat modelling with UML for cybersecurity risk management in OT-IT integrated infrastructures
Alabdulhadi Information Security and Privacy in the Cloud of Healthcare Sector, and The Use of Miter Att&ck Framework to Keep the Healthcare Secure
Ghauri Digital Security Versus Private Information
Waelchli et al. Reducing the risk of social engineering attacks using SOAR measures in a real world environment: A case study
Chris et al. The Role of AI in Enhancing Threat Detection Systems for Real-Time Cybersecurity Compliance
Adel Developing a Digital Forensic Capability for Critical Infrastructures: An Investigation Framework
Syed Implementing Comprehensive Security in Your Software Supply Chain
Vishnu Analysis of Current Machine Learning and AI Techniques to Perform Automated Hacking
Engemann et al. 10 Implications of artificial intelligence in cybersecurity for individuals
Olusegun AI-Driven Cybersecurity: Addressing the Challenges of the Digital Age