Li et al., 2016 - Google Patents
The optimized attribute attack graph based on APT attack stage modelLi et al., 2016
- Document ID
- 3693841846531050012
- Author
- Li M
- Huang W
- Wang Y
- Fan W
- Publication year
- Publication venue
- 2016 2nd IEEE International Conference on Computer and Communications (ICCC)
External Links
Snippet
Recent years people have witnessed a surge of interest in APT attack, due to its complexity and persistent attack characteristics. In this paper, we give an overview of APT attack and attack graph and also use attack graph to assist in predicting the APT attacks and identifying …
- 230000002085 persistent 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sahoo et al. | An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics | |
Kiran et al. | Building a intrusion detection system for IoT environment using machine learning techniques | |
Bhatt et al. | Towards a framework to detect multi-stage advanced persistent threats attacks | |
Niksefat et al. | Privacy issues in intrusion detection systems: A taxonomy, survey and future directions | |
Niu et al. | Identifying APT malware domain based on mobile DNS logging | |
Apruzzese et al. | Detection and threat prioritization of pivoting attacks in large networks | |
Li et al. | Complex attack linkage decision-making in edge computing networks | |
Katipally et al. | Attacker behavior analysis in multi-stage attack detection system | |
Razali et al. | IoT honeypot: A review from researcher's perspective | |
Wang et al. | MAAC: Novel alert correlation method to detect multi-step attack | |
Hu et al. | CPMTD: Cyber-physical moving target defense for hardening the security of power system against false data injected attack | |
Chen et al. | Attack sequence detection in cloud using hidden markov model | |
Jiang et al. | Novel intrusion prediction mechanism based on honeypot log similarity | |
Wang et al. | Using honeypots to model botnet attacks on the internet of medical things | |
Debashi et al. | Sonification of network traffic for detecting and learning about botnet behavior | |
Li et al. | The optimized attribute attack graph based on APT attack stage model | |
Mei et al. | A survey of advanced persistent threats attack and defense | |
Awad et al. | A network-based framework for rat-bots detection | |
Shi et al. | Survey on APT attack detection in industrial cyber-physical system | |
Roshna et al. | Botnet detection using adaptive neuro fuzzy inference system | |
Mehta et al. | Cowrie honeypot data analysis and predicting the directory traverser pattern during the attack | |
da Rocha et al. | A Study on APT in IoT Networks. | |
Huang et al. | An effective reconstruction method of the APT attack based on Hidden Markov model | |
Feng | Discussion on the Ways of Constructing Computer Network Security in Colleges: Considering Complex Worm Networks | |
Meng et al. | Research on Active Defense Technology Based on Power System Network Security |