Nothing Special   »   [go: up one dir, main page]

Li et al., 2016 - Google Patents

The optimized attribute attack graph based on APT attack stage model

Li et al., 2016

Document ID
3693841846531050012
Author
Li M
Huang W
Wang Y
Fan W
Publication year
Publication venue
2016 2nd IEEE International Conference on Computer and Communications (ICCC)

External Links

Snippet

Recent years people have witnessed a surge of interest in APT attack, due to its complexity and persistent attack characteristics. In this paper, we give an overview of APT attack and attack graph and also use attack graph to assist in predicting the APT attacks and identifying …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management

Similar Documents

Publication Publication Date Title
Sahoo et al. An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics
Kiran et al. Building a intrusion detection system for IoT environment using machine learning techniques
Bhatt et al. Towards a framework to detect multi-stage advanced persistent threats attacks
Niksefat et al. Privacy issues in intrusion detection systems: A taxonomy, survey and future directions
Niu et al. Identifying APT malware domain based on mobile DNS logging
Apruzzese et al. Detection and threat prioritization of pivoting attacks in large networks
Li et al. Complex attack linkage decision-making in edge computing networks
Katipally et al. Attacker behavior analysis in multi-stage attack detection system
Razali et al. IoT honeypot: A review from researcher's perspective
Wang et al. MAAC: Novel alert correlation method to detect multi-step attack
Hu et al. CPMTD: Cyber-physical moving target defense for hardening the security of power system against false data injected attack
Chen et al. Attack sequence detection in cloud using hidden markov model
Jiang et al. Novel intrusion prediction mechanism based on honeypot log similarity
Wang et al. Using honeypots to model botnet attacks on the internet of medical things
Debashi et al. Sonification of network traffic for detecting and learning about botnet behavior
Li et al. The optimized attribute attack graph based on APT attack stage model
Mei et al. A survey of advanced persistent threats attack and defense
Awad et al. A network-based framework for rat-bots detection
Shi et al. Survey on APT attack detection in industrial cyber-physical system
Roshna et al. Botnet detection using adaptive neuro fuzzy inference system
Mehta et al. Cowrie honeypot data analysis and predicting the directory traverser pattern during the attack
da Rocha et al. A Study on APT in IoT Networks.
Huang et al. An effective reconstruction method of the APT attack based on Hidden Markov model
Feng Discussion on the Ways of Constructing Computer Network Security in Colleges: Considering Complex Worm Networks
Meng et al. Research on Active Defense Technology Based on Power System Network Security