Machine learning for misuse-based network intrusion detection: overview, unified evaluation and feature choice comparison framework

L Le Jeune, T Goedeme, N Mentens - Ieee Access, 2021 - ieeexplore.ieee.org
Network Intrusion detection systems are essential for the protection of advanced
communication networks. Originally, these systems were hard-coded to identify specific …

Malware detection on windows audit logs using LSTMs

M Ring, D Schlör, S Wunderlich, D Landes… - Computers & Security, 2021 - Elsevier
Malware is a constant threat and is continuously evolving. Security systems try to keep up
with the constant change. One challenge that arises is the large amount of logs generated …

[HTML][HTML] Feature extraction based on word embedding models for intrusion detection in network traffic

R Corizzo, E Zdravevski, M Russell… - … , Security and Safety, 2020 - oaepublish.com
Aim: The analysis of network traffic plays a crucial role in modern organizations since it can
provide defense mechanisms against cyberattacks. In this context, machine learning …

Evaluating word embedding feature extraction techniques for host-based intrusion detection systems

PK Mvula, P Branco, GV Jourdan, HL Viktor - Discover Data, 2023 - Springer
Abstract Research into Intrusion and Anomaly Detectors at the Host level typically pays
much attention to extracting attributes from system call traces. These include window-based …

PP-CSA: Practical Privacy-Preserving Software Call Stack Analysis

Z Wang, P Ma, H Wang, S Wang - Proceedings of the ACM on …, 2024 - dl.acm.org
Software call stack is a sequence of function calls that are executed during the runtime of a
software program. Software call stack analysis (CSA) is widely used in software engineering …

Application of sequence embedding in host-based intrusion detection system

Y Lu, S Teng - 2021 IEEE 24th international conference on …, 2021 - ieeexplore.ieee.org
In the field of host-based intrusion detection systems (HIDS), existing anomaly detection
algorithms paid much attention to extracting system call features, such as N-gram, frequency …

Accurate Path Prediction of Provenance Traces

R Ahmad, HY Jung, Y Nakamura, T Malik - Proceedings of the 33rd ACM …, 2024 - dl.acm.org
Several security and workflow applications require provenance information at the operating
system level for diagnostics. The resulting provenance traces are often more informative if …

Application-Aware Intrusion Detection: A Systematic Literature Review, Implications for Automotive Systems, and Applicability of AutoML

D Schubert, H Eikerling, J Holtmann - Frontiers in Computer Science, 2021 - frontiersin.org
Modern and flexible application-level software platforms increase the attack surface of
connected vehicles and thereby require automotive engineers to adopt additional security …

MalEXLNet: A semantic analysis and detection method of malware API sequence based on EXLNet model

X Mao, Y Zhao, Y Feng, Y Hu - KSII Transactions on Internet and …, 2024 - koreascience.kr
With the continuous advancements in malicious code polymorphism and obfuscation
techniques, the performance of traditional machine learning-based detection methods for …

Efficient SVH2M for information anomaly detection in manufacturing processes on system call

CH Hsieh, F Xu, Q Yang, D Kong - KSII Transactions on Internet …, 2024 - koreascience.kr
With the integration of the manufacturing process in the Internet, cybersecurity becomes
even more important in the process of factory operations. Because of the complexity of data …