[go: up one dir, main page]

Bai et al., 2021 - Google Patents

Rdp-based lateral movement detection using machine learning

Bai et al., 2021

View PDF
Document ID
13679007705322848168
Author
Bai T
Bian H
Salahuddin M
Abou Daya A
Limam N
Boutaba R
Publication year
Publication venue
Computer communications

External Links

Snippet

Detecting cyber threats has been an on-going research endeavor. In this era, Advanced Persistent Threats (APTs) can incur significant costs for organizations and businesses. The ultimate goal of cybersecurity is to thwart attackers from achieving their malicious intent …
Continue reading at rboutaba.cs.uwaterloo.ca (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Similar Documents

Publication Publication Date Title
Bai et al. Rdp-based lateral movement detection using machine learning
Khraisat et al. A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
Wani et al. SDN‐based intrusion detection system for IoT using deep learning classifier (IDSIoT‐SDL)
Panda et al. Developing an efficient feature engineering and machine learning model for detecting IoT-botnet cyber attacks
Liu et al. Detecting and preventing cyber insider threats: A survey
Bai et al. A machine learning approach for RDP-based lateral movement detection
Nisioti et al. From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods
Bijone A survey on secure network: intrusion detection & prevention approaches
Rashid et al. Machine and deep learning based comparative analysis using hybrid approaches for intrusion detection system
Moustafa Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic
Bian et al. Uncovering lateral movement using authentication logs
Koroniotis et al. A new intelligent satellite deep learning network forensic framework for smart satellite networks
Khaleefa et al. Concept and difficulties of advanced persistent threats (APT): Survey
Kumar et al. INTRUSION DETECTION SYSTEMS: A REVIEW.
Shang et al. Discovering unknown advanced persistent threat using shared features mined by neural networks
Krishnapriya et al. A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques.
Bian et al. Host in danger? detecting network intrusions from authentication logs
Nazir et al. Network intrusion detection: Taxonomy and machine learning applications
Monshizadeh et al. Security related data mining
Suresh et al. Detection of malicious activities by AI-Supported Anomaly-Based IDS
Niranjan et al. Security in data mining-a comprehensive survey
Rani et al. Analysis of machine learning and deep learning intrusion detection system in internet of things network
Jean-Philippe Enhancing computer network defense technologies with machine learning and artificial intelligence
Jha et al. Framework to analyze malicious behaviour in cloud environment using machine learning techniques
Amar et al. Weighted LSTM for intrusion detection and data mining to prevent attacks