Detecting and preventing cyber insider threats: A survey

L Liu, O De Vel, QL Han, J Zhang… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …

Host-based intrusion detection system with system calls: Review and future trends

M Liu, Z Xue, X Xu, C Zhong, J Chen - ACM computing surveys (CSUR), 2018 - dl.acm.org
In a contemporary data center, Linux applications often generate a large quantity of real-time
system call traces, which are not suitable for traditional host-based intrusion detection …

A systematic review of fuzzing techniques

C Chen, B Cui, J Ma, R Wu, J Guo, W Liu - Computers & Security, 2018 - Elsevier
Fuzzing is an effective and widely used technique for finding security bugs and
vulnerabilities in software. It inputs irregular test data into a target program to try to trigger a …

Using Bayesian networks for probabilistic identification of zero-day attack paths

X Sun, J Dai, P Liu, A Singhal… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Enforcing a variety of security measures (such as intrusion detection systems, and so on)
can provide a certain level of protection to computer networks. However, such security …

HIDS: A host based intrusion detection system for cloud computing environment

P Deshpande, SC Sharma, SK Peddoju… - International Journal of …, 2018 - Springer
The paper reports a host based intrusion detection model for Cloud computing environment
along with its implementation and analysis. This model alerts the Cloud user against the …

{SAQL}: A stream-based query system for {Real-Time} abnormal system behavior detection

P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim… - 27th USENIX Security …, 2018 - usenix.org
Recently, advanced cyber attacks, which consist of a sequence of steps that involve many
vulnerabilities and hosts, compromise the security of many well-protected businesses. This …

[图书][B] Adversarial machine learning

AD Joseph, B Nelson, BIP Rubinstein, JD Tygar - 2018 - books.google.com
Written by leading researchers, this complete introduction brings together all the theory and
tools needed for building robust machine learning in adversarial environments. Discover …

[HTML][HTML] Analyzing business process anomalies using autoencoders

T Nolle, S Luettgen, A Seeliger, M Mühlhäuser - Machine Learning, 2018 - Springer
Businesses are naturally interested in detecting anomalies in their internal processes,
because these can be indicators for fraud and inefficiencies. Within the domain of business …

Ensemble Prediction Algorithm of Anomaly Monitoring Based on Big Data Analysis Platform of Open‐Pit Mine Slope

S Jiang, M Lian, C Lu, Q Gu, S Ruan, X Xie - Complexity, 2018 - Wiley Online Library
With the diversification of pit mine slope monitoring and the development of new
technologies such as multisource data flow monitoring, normal alert log processing system …

VMGuard: A VMI-based security architecture for intrusion detection in cloud environment

P Mishra, V Varadharajan, ES Pilli… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Cloud security is of paramount importance in the new era of computing. Advanced malware
can hide their behavior on detection of the presence of a security tool at a tenant virtual …