Network Intrusion Detection Systems (NIDS) are designed to safeguard the security needs of enterprise networks against cyber-attacks. However, NIDS networks suffer from several …
Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific to a network under observation. Such CTI currently requires extensive expert input for …
This paper considers key challenges to using re-inforcement learning (RL) with attack graphs to automate penetration testing in real-world applications from a systems …
X Zang, J Gong, X Zhang, G Li - Computers & Security, 2023 - Elsevier
Nowadays, new-generation threats often use multiple means or perform several steps to intrude into networks and ultimately reach their objective. These new threats have multi …
Intrusion Detection Systems (IDSs) automatically analyze event logs and network traffic in order to detect malicious activity and policy violations. Because IDSs have a large number of …
S Kably, T Benbarrad, N Alaoui… - Computers, Materials & …, 2023 - cdn.techscience.cn
Blockchain merges technology with the Internet of Things (IoT) for addressing security and privacy-related issues. However, conventional blockchain suffers from scalability issues due …
Attack graphs (AG) are used to assess pathways availed by cyber adversaries to penetrate a network. State-of-the-art approaches for AG generation focus mostly on deriving …
Y Wang, Y Guo, C Fang - Journal of Information Security and Applications, 2022 - Elsevier
Nowadays, advanced persistent threats (APTs) compromise critical large-scale networks more frequently, however, detecting these APTs is difficult. Since security sensors often miss …
ML Diakhame, C Diallo, M Mejri - 2023 7th Cyber Security in …, 2023 - ieeexplore.ieee.org
Cyber attack scenario reconstruction plays a crucial role in understanding and mitigating security breaches. In this paper, we propose a novel framework that leverages Natural …