基于大数据分析的APT 攻击检测研究综述

付钰, 李洪成, 吴晓平, 王甲生 - 通信学报, 2015 - infocomm-journal.com
高级持续性威胁(APT, advanced persistent threat) 已成为高安全等级网络的最主要威胁之一,
其极强的针对性, 伪装性和阶段性使传统检测技术无法有效识别, 因此新型攻击检测技术成为 …

[PDF][PDF] SoK: A Systematic Review of Insider Threat Detection.

A Kim, J Oh, J Ryu, J Lee, K Kwon, K Lee - J. Wirel. Mob. Networks …, 2019 - jowua.com
Due to the subtle nature of the insider threat, government bodies and corporate
organizations are forced to face the insider threat that is both malicious and accidental. In …

[图书][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

A classification model of power equipment defect texts based on convolutional neural network

J Zhou, G Luo, C Hu, Y Chen - … Conference, ICAIS 2019, New York, NY …, 2019 - Springer
A large amount of equipment defect texts are left unused in power management system.
According to the features of power equipment defect texts, a classification model of defect …

DDSGA: A data-driven semi-global alignment approach for detecting masquerade attacks

HA Kholidy, F Baiardi, S Hariri - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
A masquerade attacker impersonates a legal user to utilize the user services and privileges.
The semi-global alignment algorithm (SGA) is one of the most effective and efficient …

[PDF][PDF] Detecting APT attacks: a survey from the perspective of big data analysis

Y Fu, H Li, X Wu, J Wang - Journal on Communications, 2015 - infocomm-journal.com
Advanced persistent threats have become the major threats of highly protected networks.
Traditional detecting technologies were not able to find out APT attacks which were targeted …

Masquerade detection using profile hidden Markov models

L Huang, M Stamp - Computers & Security, 2011 - Elsevier
In this paper, we consider the problem of masquerade detection, based on user-issued
UNIX commands. We present a novel detection technique based on profile hidden Markov …

基于改进聚类分析的网络流量异常检测方法

李洪成, 吴晓平, 姜洪海 - 网络与信息安全学报, 2015 - infocomm-journal.com
针对传统基于聚类分析的网络流量异常检测方法准确性较低的问题, 提出了一种基于改进k-
means 聚类的流量异常检测方法. 通过对各类流量特征数据的预处理, 使k-means …

Using instance-weighted naive Bayes for adapting concept drift in masquerade detection

S Sen - International Journal of Information Security, 2014 - Springer
Although there are many approaches proposed for masquerade detection in the literature,
few of them consider concept drift; the problem of distinguishing malicious behaviours from …

Model for detection of masquerade attacks based on variable-length sequences

G Barseghyan, Y Yuan, M Anakpa - IEEE Access, 2020 - ieeexplore.ieee.org
A masquerader is an attacker who gains illegitimate access to a user's account. Masquerade
detection is one of the key problems of intrusion detection systems. Deep learning models …