2019
DOI: 10.1007/s00502-019-00780-x
|View full text |Cite
|
Sign up to set email alerts
|

Advanced threat intelligence: detection and classification of anomalous behavior in system processes

Abstract: With the advent of Advanced Persistent Threats (APTs), it has become increasingly difficult to identify and understand attacks on computer systems. This paper presents a system capable of explaining anomalous behavior within network-enabled user sessions by describing and interpreting kernel event anomalies detected by their deviation from normal behavior.The prototype has been developed at the Josef Ressel Center for Unified Threat Intelligence on Targeted Attacks (TARGET) at St. Pölten University of Applied … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…Process trees were further studied in [17], where structures from process trees were compared against reference trees known to be nonmalicious. A similar technique was used by [18], comparing star structures with templates extracted from uninfected trees. However, none of the aforementioned approaches are designed to process complex data structures that are hierarchical and sequential simultaneously.…”
Section: Related Workmentioning
confidence: 99%
“…Process trees were further studied in [17], where structures from process trees were compared against reference trees known to be nonmalicious. A similar technique was used by [18], comparing star structures with templates extracted from uninfected trees. However, none of the aforementioned approaches are designed to process complex data structures that are hierarchical and sequential simultaneously.…”
Section: Related Workmentioning
confidence: 99%