Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Stephen Moskal"'
Publikováno v:
Proceedings of the Genetic and Evolutionary Computation Conference Companion.
On the Variety and Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks
Publikováno v:
ACM Transactions on Management Information Systems. 11:1-21
Many cyber attack actions can be observed, but the observables often exhibit intricate feature dependencies, non-homogeneity, and potentially rare yet critical samples. This work tests the ability to learn, model, and synthesize cyber intrusion alert
Publikováno v:
IEEE Transactions on Dependable and Secure Computing, 19(2)
Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific to a network under observation. Such CTI currently requires extensive expert input for obtaining, assessing, and correlating system vulnerabilities int
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::447716586839cd72c4384164abe0df47
http://resolver.tudelft.nl/uuid:af89be21-a3a4-4701-be44-40f2c4677f63
http://resolver.tudelft.nl/uuid:af89be21-a3a4-4701-be44-40f2c4677f63
Autor:
Stephen Moskal, Shanchieh Jay Yang
Publikováno v:
2021 IEEE Conference on Communications and Network Security (CNS).
Publikováno v:
CCS 2021-Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
CCS
CCS
Attack graphs (AG) are a popular area of research that display all the paths an attacker can exploit to penetrate a network. Existing techniques for AG generation rely heavily on expert input regarding vulnerabilities and network topology. In this wo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::573f42a1ecf9a46d84a0ffcc0a71163a
http://resolver.tudelft.nl/uuid:66025049-d059-4a1a-b971-4474736f40f0
http://resolver.tudelft.nl/uuid:66025049-d059-4a1a-b971-4474736f40f0
Publikováno v:
DS-RT
Recognizing the need for proactive analysis of cyber adversary behavior, this paper presents a new event-driven simulation model and implementation to reveal the efforts needed by attackers who have various entry points into a network. Unlike previou
Autor:
Shao-Hsusan Su, Stephen Moskal, Aunshul Rege, Katorah Williams, Alyssa Mendlein, Shanchieh Yang
Publikováno v:
IWSPA@CODASPY
Advanced Persistent Threats (APTs) are professional, sophisticated threats that pose a serious concern to our technologically-dependent society. As these threats become more common, conventional response-driven cyberattack management needs to be subs
Publikováno v:
MILCOM
Cyber Intrusion alerts are commonly collected by corporations to analyze network traffic and glean information about attacks perpetrated against the network. However, datasets of true malignant alerts are rare and generally only show one potential at
Publikováno v:
The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology. 15:13-29
Existing research on cyber threat assessment focuses on analyzing the network vulnerabilities and producing possible attack graphs. Cyber attacks in real-world enterprise networks, however, vary significantly due to not only network and system config
Publikováno v:
ISI
Intrusion detection system (IDS) is an integral part of computer networks to monitor and detect threats. However, the alerts raised by these systems are often overwhelming to security analysts, making it difficult to uncover the steps an attacker too