[go: up one dir, main page]

Alzu’bi et al., 2025 - Google Patents

Cyberattack event logs classification using deep learning with semantic feature analysis

Alzu’bi et al., 2025

Document ID
12865865454618324826
Author
Alzu’bi A
Darwish O
Albashayreh A
Tashtoush Y
Publication year
Publication venue
Computers & Security

External Links

Snippet

Event logs play a crucial role in cybersecurity by detecting potentially malicious network activities and preventing data loss or theft. Previous work did not place a high value on log messages and their impact on security breach prediction and intrusion detection. This …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3495Performance evaluation by tracing or monitoring for systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3409Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • G06F11/3612Software analysis for verifying properties of programs by runtime analysis

Similar Documents

Publication Publication Date Title
Ozkan-Okay et al. A comprehensive systematic literature review on intrusion detection systems
US12225045B2 (en) Incorporating software-as-a-service data into a cyber threat defense system
Bai et al. Rdp-based lateral movement detection using machine learning
Mukhopadhyay et al. A comparative study of related technologies of intrusion detection & prevention systems
Kumar et al. Intrusion detection systems: a review
Deka et al. Network defense: Approaches, methods and techniques
Alzu’bi et al. Cyberattack event logs classification using deep learning with semantic feature analysis
Möller Intrusion detection and prevention
Tashfeen Intrusion detection system using ai and machine learning algorithm
Wani et al. Modelling an Intrusion Detection system using ensemble approach based on voting to improve accuracy of base classifiers
Marinova-Boncheva Applying a data mining method for intrusion detection
Nazir et al. Combinatorial optimization based feature selection method: A study on network intrusion detection
Mills Enhancing Anomaly Detection Techniques for Emerging Threats
Alsaeedi et al. Performance analysis of network intrusion detection system using machine learning
Maidamwar et al. Intrusion Detection Systems in IoT: Techniques, Datasets, and Challenges
Al Maqousi et al. Autonomous Cyber Defense in Smart Cities: An AI-Driven Framework for Integrated Urban Infrastructure Protection
Bhardwaj et al. Machine Learning and Artificial Intelligence for Detecting Cyber Security Threats in IoT Environmment
Almutairi Improving intrusion detection systems using data mining techniques
Ahmed Data-driven framework and experimental validation for security monitoring of networked systems
Petersen Detecting network intrusions
Alqahtani The detection of Advanced Persistent Threats in Software Defined Networks using Machine Learning
Salih et al. Semantical rule-based false positive detection for IDS
Han et al. Network Based Intelligent Malware Detection
Pierre et al. Hybrid machine learning mechanism for intrusion detection systems in network security
Nuangpookka The Need for an Internally Developed Intrusion Detection System for Web Servers