Automatic Recognition of Advanced Persistent Threat Tactics for Enterprise Security
暂无分享,去创建一个
[1] Feifei Li,et al. DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning , 2017, CCS.
[2] Prabaharan Poornachandran,et al. An efficient classification model for detecting advanced persistent threat , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[3] Fei Wang,et al. HERCULE: attack story reconstruction via community discovery on correlated log graph , 2016, ACSAC.
[4] Joshua Neil,et al. Attack chain detection , 2015, Stat. Anal. Data Min..
[5] B. Wu,et al. Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis , 2015, IEEE Access.
[6] Fei Wang,et al. MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning , 2017, USENIX Security Symposium.
[7] Laurent Vanbever,et al. Unsupervised Detection of APT C&C Channels using Web Request Graphs , 2017, DIMVA.
[8] Zhou Li,et al. MADE: Security Analytics for Enterprise Threat Detection , 2018, ACSAC.
[9] Khaled M. Rabie,et al. Detection of advanced persistent threat using machine-learning correlation analysis , 2018, Future Gener. Comput. Syst..
[10] Xiangyu Zhang,et al. High Accuracy Attack Provenance via Binary-based Execution Partition , 2013, NDSS.
[11] Xiangyu Zhang,et al. ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting , 2016, NDSS.
[12] Witold Kinsner,et al. Detecting Advanced Persistent Threats using Fractal Dimension based Machine Learning Classification , 2016, IWSPA@CODASPY.
[13] V. N. Venkatakrishnan,et al. SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data , 2018, USENIX Security Symposium.
[14] V. N. Venkatakrishnan,et al. HOLMES: Real-Time APT Detection through Correlation of Suspicious Information Flows , 2018, 2019 IEEE Symposium on Security and Privacy (SP).