A survey of intrusion detection systems leveraging host data

RA Bridges, TR Glass-Vanderlan… - ACM computing …, 2019 - dl.acm.org
This survey focuses on intrusion detection systems (IDS) that leverage host-based data
sources for detecting attacks on enterprise network. The host-based IDS (HIDS) literature is …

Security operations center: A systematic study and open challenges

M Vielberth, F Böhm, I Fichtinger, G Pernul - Ieee Access, 2020 - ieeexplore.ieee.org
Since the introduction of Security Operations Centers (SOCs) around 15 years ago, their
importance has grown significantly, especially over the last five years. This is mainly due to …

Deepran: Attention-based bilstm and crf for ransomware early detection and classification

KC Roy, Q Chen - Information Systems Frontiers, 2021 - Springer
Ransomware is a self-propagating malware encrypting file systems of the compromised
computers to extort victims for financial gains. Hundreds of schools, hospitals, and local …

Automated ransomware behavior analysis: Pattern extraction and early detection

Q Chen, SR Islam, H Haswell, RA Bridges - Science of Cyber Security …, 2019 - Springer
Security operation centers (SOCs) typically use a variety of tools to collect large volumes of
host logs for detection and forensic of intrusions. Our experience, supported by recent user …

End-to-end anomaly detection for identifying malicious cyber behavior through NLP-based log embeddings

A Golczynski, JA Emanuello - arXiv preprint arXiv:2108.12276, 2021 - arxiv.org
Rule-based IDS (intrusion detection systems) are being replaced by more robust neural IDS,
which demonstrate great potential in the field of Cybersecurity. However, these ML …

The role of circular economy in EU entrepreneurship: A deep learning experiment

G Morelli, C Pozzi, AR Gurrieri, M Mele… - The Journal of Economic …, 2024 - Elsevier
Fostering innovation is one of the key roles of the Circular Economy (CE) that applies also to
European Union (EU) firms, because entrepreneurs are persistently seeking new ways and …

procmonML: Generating evasion resilient host-based behavioral analytics from tree ensembles

JW Mikhail, JC Williams, GR Roelke - Computers & Security, 2020 - Elsevier
Host-based analytics are useful for identifying nefarious activity and limiting the impact of an
adversary's cyber attack on an endpoint. The majority of open-source host-based analytics …

[HTML][HTML] Blockade-detection-response based security operations dashboard design

CH Han - Computers in Human Behavior Reports, 2021 - Elsevier
Standardization of the security operations dashboard is essential for efficient operation of
security operations center. It must be able to comprehensively express the business …

Towards modeling host-based data for cyber-psychological assessment in cyber threat detection

KC Roy - 2022 - search.proquest.com
Cyber attacks are constantly on the rise, affecting everything from financial institutions to
higher education. Many critical infrastructures such as health care, transportation and …

Robustness of ML-Enhanced IDS to Stealthy Adversaries

V Wong, J Emanuello - arXiv preprint arXiv:2104.10742, 2021 - arxiv.org
Intrusion Detection Systems (IDS) enhanced with Machine Learning (ML) have
demonstrated the capacity to efficiently build a prototype of" normal" cyber behaviors in …