A systematic survey on multi-step attack detection

J Navarro, A Deruyver, P Parrend - Computers & Security, 2018 - Elsevier
Since the beginning of the Internet, cyberattacks have threatened users and organisations.
They have become more complex concurrently with computer networks. Nowadays …

Network forensics: Review, taxonomy, and open challenges

S Khan, A Gani, AWA Wahab, M Shiraz… - Journal of Network and …, 2016 - Elsevier
In recent years, a number of network forensics techniques have been proposed to
investigate the increasing number of cybercrimes. Network forensics techniques assist in …

Method and apparatus for detecting a multi-stage event

I Herwono, Z Cui - US Patent 9,836,600, 2017 - Google Patents
A multi-stage event detector for monitoring a system, the multi-stage event detector
including: a process generator operable to generate main and sub-processes, each main …

Method and apparatus for detecting a multi-stage event

I Herwono, Z Cui, B Azvine, M Brown… - US Patent 9,870,470, 2018 - Google Patents
A multi-stage event detector for monitoring a system to detect the occurrence of multistage
events in the monitored system, the multi-stage event detector includes: one or more event …

Morwilog: an ACO-based system for outlining multi-step attacks

J Navarro-Lara, A Deruyver… - 2016 IEEE Symposium …, 2016 - ieeexplore.ieee.org
Threat detection is one of the basic mechanisms for protecting a network, as prevention
does not suffice. Finding an attack is difficult because the most harmful ones are specially …

Способ обнаружения и классификации многоэтапной атаки на основе долгой краткосрочной памяти

ВА Липатников, АА Ломанов - Технологии. Инновации. Связь, 2022 - elibrary.ru
Предложен способ обнаружения и классификации многоэтапной атаки на основе
долгой краткосрочной памяти. Проведено исследование нейронных сетей с долгой …

A survey of intrusion alert correlation and its design considerations

L Yu Beng, S Ramadass, S Manickam… - IETE Technical …, 2014 - Taylor & Francis
In recent years, network intrusion attempts have been on the rise. Malicious attempts,
including hacking, botnets, and worms are used to intrude and compromise the …

Efficient attack plan recognition using automated planning

A Amos-Binks, J Clark, K Weston… - … IEEE symposium on …, 2017 - ieeexplore.ieee.org
Network attacks are becoming ever more sophisticated and are able to hide more easily in
the increasing amount of traffic being generated by everyday activity. Administrators are …

Mining intrusion detection alert logs to minimise false positives & gain attack insight

RO Shittu - 2016 - openaccess.city.ac.uk
Utilising Intrusion Detection System (IDS) logs in security event analysis is crucial in the
process of assessing, measuring and understanding the security state of a computer …

High reliability challenges with Cu wire bonding for automotive devices in the AEC-Q006

J Jeon, SH Na, SH Jeon, M Mo… - 2017 IEEE 67th …, 2017 - ieeexplore.ieee.org
Copper (Cu) wires are increasingly used in semiconductor devices to provide cost-effective
packaging. With its excellent electrical properties, copper has higher mechanical properties …