Alzu’bi et al., 2025 - Google Patents
Cyberattack event logs classification using deep learning with semantic feature analysisAlzu’bi et al., 2025
- Document ID
- 12865865454618324826
- Author
- Alzu’bi A
- Darwish O
- Albashayreh A
- Tashtoush Y
- Publication year
- Publication venue
- Computers & Security
External Links
Snippet
Event logs play a crucial role in cybersecurity by detecting potentially malicious network activities and preventing data loss or theft. Previous work did not place a high value on log messages and their impact on security breach prediction and intrusion detection. This …
- 238000013135 deep learning 0 title abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3476—Data logging
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3495—Performance evaluation by tracing or monitoring for systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3409—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
- G06F11/3612—Software analysis for verifying properties of programs by runtime analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ozkan-Okay et al. | A comprehensive systematic literature review on intrusion detection systems | |
US12225045B2 (en) | Incorporating software-as-a-service data into a cyber threat defense system | |
Bai et al. | Rdp-based lateral movement detection using machine learning | |
Mukhopadhyay et al. | A comparative study of related technologies of intrusion detection & prevention systems | |
Kumar et al. | Intrusion detection systems: a review | |
Deka et al. | Network defense: Approaches, methods and techniques | |
Alzu’bi et al. | Cyberattack event logs classification using deep learning with semantic feature analysis | |
Möller | Intrusion detection and prevention | |
Tashfeen | Intrusion detection system using ai and machine learning algorithm | |
Wani et al. | Modelling an Intrusion Detection system using ensemble approach based on voting to improve accuracy of base classifiers | |
Marinova-Boncheva | Applying a data mining method for intrusion detection | |
Nazir et al. | Combinatorial optimization based feature selection method: A study on network intrusion detection | |
Mills | Enhancing Anomaly Detection Techniques for Emerging Threats | |
Alsaeedi et al. | Performance analysis of network intrusion detection system using machine learning | |
Maidamwar et al. | Intrusion Detection Systems in IoT: Techniques, Datasets, and Challenges | |
Al Maqousi et al. | Autonomous Cyber Defense in Smart Cities: An AI-Driven Framework for Integrated Urban Infrastructure Protection | |
Bhardwaj et al. | Machine Learning and Artificial Intelligence for Detecting Cyber Security Threats in IoT Environmment | |
Almutairi | Improving intrusion detection systems using data mining techniques | |
Ahmed | Data-driven framework and experimental validation for security monitoring of networked systems | |
Petersen | Detecting network intrusions | |
Alqahtani | The detection of Advanced Persistent Threats in Software Defined Networks using Machine Learning | |
Salih et al. | Semantical rule-based false positive detection for IDS | |
Han et al. | Network Based Intelligent Malware Detection | |
Pierre et al. | Hybrid machine learning mechanism for intrusion detection systems in network security | |
Nuangpookka | The Need for an Internally Developed Intrusion Detection System for Web Servers |