Bai et al., 2021 - Google Patents
Rdp-based lateral movement detection using machine learningBai et al., 2021
View PDF- Document ID
- 13679007705322848168
- Author
- Bai T
- Bian H
- Salahuddin M
- Abou Daya A
- Limam N
- Boutaba R
- Publication year
- Publication venue
- Computer communications
External Links
Snippet
Detecting cyber threats has been an on-going research endeavor. In this era, Advanced Persistent Threats (APTs) can incur significant costs for organizations and businesses. The ultimate goal of cybersecurity is to thwart attackers from achieving their malicious intent …
- 238000010801 machine learning 0 title abstract description 57
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Bai et al. | Rdp-based lateral movement detection using machine learning | |
| Khraisat et al. | A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges | |
| Wani et al. | SDN‐based intrusion detection system for IoT using deep learning classifier (IDSIoT‐SDL) | |
| Panda et al. | Developing an efficient feature engineering and machine learning model for detecting IoT-botnet cyber attacks | |
| Liu et al. | Detecting and preventing cyber insider threats: A survey | |
| Bai et al. | A machine learning approach for RDP-based lateral movement detection | |
| Nisioti et al. | From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods | |
| Bijone | A survey on secure network: intrusion detection & prevention approaches | |
| Rashid et al. | Machine and deep learning based comparative analysis using hybrid approaches for intrusion detection system | |
| Moustafa | Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic | |
| Bian et al. | Uncovering lateral movement using authentication logs | |
| Koroniotis et al. | A new intelligent satellite deep learning network forensic framework for smart satellite networks | |
| Khaleefa et al. | Concept and difficulties of advanced persistent threats (APT): Survey | |
| Kumar et al. | INTRUSION DETECTION SYSTEMS: A REVIEW. | |
| Shang et al. | Discovering unknown advanced persistent threat using shared features mined by neural networks | |
| Krishnapriya et al. | A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques. | |
| Bian et al. | Host in danger? detecting network intrusions from authentication logs | |
| Nazir et al. | Network intrusion detection: Taxonomy and machine learning applications | |
| Monshizadeh et al. | Security related data mining | |
| Suresh et al. | Detection of malicious activities by AI-Supported Anomaly-Based IDS | |
| Niranjan et al. | Security in data mining-a comprehensive survey | |
| Rani et al. | Analysis of machine learning and deep learning intrusion detection system in internet of things network | |
| Jean-Philippe | Enhancing computer network defense technologies with machine learning and artificial intelligence | |
| Jha et al. | Framework to analyze malicious behaviour in cloud environment using machine learning techniques | |
| Amar et al. | Weighted LSTM for intrusion detection and data mining to prevent attacks |