Extracting and evaluating similar and unique cyber attack strategies from intrusion alerts

S Moskal, SJ Yang, ME Kuhl - 2018 IEEE international …, 2018 - ieeexplore.ieee.org
Intrusion detection system (IDS) is an integral part of computer networks to monitor and
detect threats. However, the alerts raised by these systems are often overwhelming to …

Development of a cyberattack response planning method for nuclear power plants by using the Markov decision process model

C Lee, SM Han, YH Chae, PH Seong - Annals of Nuclear Energy, 2022 - Elsevier
In an NPP cyberattack situation, not only safety response actions but also security response
actions must be taken. However, operators unfamiliar with the cyber security may have …

An intelligent platform for threat assessment and cyber-attack mitigation in IoMT ecosystems

N Kolokotronis, M Dareioti, S Shiaeles… - 2022 IEEE Globecom …, 2022 - ieeexplore.ieee.org
The increasing connectivity of medical devices along with the growing complexity,
heterogeneity and attack surface of healthcare ecosystems has lead to numerous severe …

[PDF][PDF] Android botnets: a serious threat to android devices.

S Anwar, MF Zolkipli, Z Inayat, J Odili, M Ali… - Pertanika Journal of …, 2018 - core.ac.uk
Android devices have gained a lot of attention in the last few decades due to several
reasons including ease of use, effectiveness, availability and games, among others. To take …

MLIDS22-IDS Design by Applying Hybrid CNN-LSTM Model on Mixed-Datasets

IA Abdulmajeed, IM Husien - Informatica, 2022 - informatica.si
The intrusion detection system (IDS) is an essential part of cyber security which captures
and investigates traffic to distinguish between legitimate and malicious activities and …

Dynamic countermeasures selection for multi-path attacks

F Li, Y Li, S Leng, Y Guo, K Geng, Z Wang, L Fang - Computers & Security, 2020 - Elsevier
Multi-step attacks have been widely adopted by attackers, resulting in privacy leakage.
Although many cost-sensitive approaches have been proposed to respond to the multi-step …

Decision-making for intrusion response: Which, where, in what order, and how long?

Y Guo, H Zhang, Z Li, F Li, L Fang… - ICC 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
Generating fine-grained response policies is a fundamental problem for Intrusion Response
Systems (IRSs). Although existing schemes determine countermeasures and defense points …

[PDF][PDF] Red-Zone: Towards an Intrusion Response Framework for Intra-vehicle System.

M Hamad, M Tsantekidis, V Prevelakis - VEHITS, 2019 - academia.edu
Modern vehicles are increasingly equipped with highly automated control systems both for
driving and for passenger comfort. An integral part of these systems are the communication …

Cyber-Security Threats, Actors, and Dynamic Mitigation

N Kolokotronis, S Shiaeles - 2021 - books.google.com
Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-
of-the-art perspective as well as a systematic overview of the recent advances in different …

Decision model of intrusion response based on markov game in fog computing environment

X Ma, Y Li, Y Gao - Wireless Networks, 2023 - Springer
For the current problems of complex network state, difficulty in fast response to intrusion and
poor adaptation of response decision in fog computing environment, in this paper, we …