Zobrazeno 1 - 10
of 249
pro vyhledávání: '"BATES, ADAM"'
While Endpoint Detection and Response (EDR) are able to efficiently monitor threats by comparing static rules to the event stream, their inability to incorporate past system context leads to high rates of false alarms. Recent work has demonstrated Pr
Externí odkaz:
http://arxiv.org/abs/2408.13347
Autor:
Oliver, Jonathan, Batta, Raghav, Bates, Adam, Inam, Muhammad Adil, Mehta, Shelly, Xia, Shugao
"Alert fatigue" is one of the biggest challenges faced by the Security Operations Center (SOC) today, with analysts spending more than half of their time reviewing false alerts. Endpoint detection products raise alerts by pattern matching on event te
Externí odkaz:
http://arxiv.org/abs/2405.04691
ATLASv2 is based on a previously generated dataset included in "ATLAS: A Sequence-based Learning Approach for Attack Investigation." The original ATLAS dataset is comprised of Windows Security Auditing system logs, Firefox logs, and DNS logs via Wire
Externí odkaz:
http://arxiv.org/abs/2401.01341
Autor:
Bansal, Ayoosh, Kandikuppa, Anant, Chen, Chien-Ying, Hasan, Monowar, Bates, Adam, Mohan, Sibin
System auditing is a powerful tool that provides insight into the nature of suspicious events in computing systems, allowing machine operators to detect and subsequently investigate security incidents. While auditing has proven invaluable to the secu
Externí odkaz:
http://arxiv.org/abs/2208.02699
Advanced Persistent Threats (APTs) are difficult to detect due to their "low-and-slow" attack patterns and frequent use of zero-day exploits. We present UNICORN, an anomaly-based APT detector that effectively leverages data provenance analysis. From
Externí odkaz:
http://arxiv.org/abs/2001.01525
Autor:
Pasquier, Thomas, Han, Xueyuan, Moyer, Thomas, Bates, Adam, Hermant, Olivier, Eyers, David, Bacon, Jean, Seltzer, Margo
Identifying the root cause and impact of a system intrusion remains a foundational challenge in computer security. Digital provenance provides a detailed history of the flow of information within a computing system, connecting suspicious events to th
Externí odkaz:
http://arxiv.org/abs/1808.06049
Autor:
Bates, Adam, Butler, Kevin, Dobra, Alin, Reaves, Brad, Cable, Patrick, Moyer, Thomas, Schear, Nabil
Data provenance is a valuable tool for detecting and preventing cyber attack, providing insight into the nature of suspicious events. For example, an administrator can use provenance to identify the perpetrator of a data leak, track an attacker's act
Externí odkaz:
http://arxiv.org/abs/1609.00266
Autor:
Bates, Adam
This paper presents co-resident watermarking, a traffic analysis attack for cloud environments that allows a malicious co-resident virtual machine to inject a watermark signature into the network flow of a target instance. This watermark can be used
Externí odkaz:
http://hdl.handle.net/1794/12507
Autor:
Bates, Adam James
Situated at the very juncture of the aquatic and terrestrial, exposed riverine sediments (ERS) are poorly vegetated alluvial deposits of silts, sands and gravels, which are habitat for a wide range of rare and highly specialised beetles. The thesis a
Externí odkaz:
https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.433735
Autor:
Zhou, Xiaofei1 (AUTHOR), Bates, Adam Hwan2 (AUTHOR), Mahajan, Uma V.3 (AUTHOR), Desai, Ansh3 (AUTHOR), Butke, Jeffrey3 (AUTHOR), Shammassian, Berje1,4 (AUTHOR) bhsham@gmail.com, Duan, Yifei1 (AUTHOR), Burant, Christopher5 (AUTHOR), Sarna, Kaylee5 (AUTHOR), Sajatovic, Martha6,7 (AUTHOR), Dani, Dhimant2 (AUTHOR), Hoffer, S. Alan1 (AUTHOR)
Publikováno v:
PLoS ONE. 2/24/2023, Vol. 17 Issue 2, p1-11. 11p.