2019
DOI: 10.1109/access.2019.2953095
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles

Abstract: One of the major challenges in cybersecurity is the provision of an automated and effective cyber-threats detection technique. In this paper, we present an AI technique for cyber-threats detection, based on artificial neural networks. The proposed technique converts multitude of collected security events to individual event profiles and use a deep learning-based detection method for enhanced cyber-threat detection. For this work, we developed an AI-SIEM system based on a combination of event profiling for data… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
3
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 88 publications
(23 citation statements)
references
References 47 publications
0
23
0
Order By: Relevance
“…UBA solutions study patterns of human behavior and then apply algorithms to detect anomalies of these patterns. For example, in [5], the case is considered in which an attacker on a company's network can use stolen credentials to secretly collect confidential data. This behavior is difficult to detect unless it triggers an access violation or data leak warning.…”
Section: Discussionmentioning
confidence: 99%
“…UBA solutions study patterns of human behavior and then apply algorithms to detect anomalies of these patterns. For example, in [5], the case is considered in which an attacker on a company's network can use stolen credentials to secretly collect confidential data. This behavior is difficult to detect unless it triggers an access violation or data leak warning.…”
Section: Discussionmentioning
confidence: 99%
“…Jonghoon Lee et al [21] proposed a Man-made intelligence strategy for cyber-threats recognition, given artificial neural organizations. The proposed procedure changes a huge number of gathered safety measures to singular events summary and utilizes a profound learning-based recognition technique.…”
Section: Related Workmentioning
confidence: 99%
“…eir prediction model uses an expectation maximization (EM) algorithm [13][14][15]. Ghorbanian et al [16] proposed a framework to incorporate predictive analysis technology into CEP applications.…”
Section: Introductionmentioning
confidence: 99%