2019 International Conference on Information and Communication Technology Convergence (ICTC) 2019
DOI: 10.1109/ictc46691.2019.8939836
|View full text |Cite
|
Sign up to set email alerts
|

Endpoint Detection and Response: Why Use Machine Learning?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…During attacks, one may notice the involvement of processes like Powershell.exe and gswin32c.exe, which are not typically seen in normal situations but are linked to the execution of malicious scripts. Furthermore, as mentioned in previous studies [21][22][23], in EDR environments, rapid response is crucial, so the log preprocessing steps must be lightweight. Considering this, this paper proposes a lightweight feature extraction technique that focuses on identifying process chains using the Original Log.…”
Section: A Data Description and Data Featuringmentioning
confidence: 99%
“…During attacks, one may notice the involvement of processes like Powershell.exe and gswin32c.exe, which are not typically seen in normal situations but are linked to the execution of malicious scripts. Furthermore, as mentioned in previous studies [21][22][23], in EDR environments, rapid response is crucial, so the log preprocessing steps must be lightweight. Considering this, this paper proposes a lightweight feature extraction technique that focuses on identifying process chains using the Original Log.…”
Section: A Data Description and Data Featuringmentioning
confidence: 99%
“…However, most commercial threat detection systems are developed on closed platforms, rendering system adaption to each endpoint environment difficult. Consequently, it is expensive and time-consuming to develop and implement endpoint security systems [6]. Furthermore, detecting APT attacks with a single open-source threat detector is difficult because conventional systems can detect only fragmentary attacks based on limited log data.…”
Section: Introductionmentioning
confidence: 99%
“…can be defined as a total of 16 conditions, depending on whether the attacker performsSteps 4,6,7, and 8. Condition 1 is a type that goes through all Steps 4, 6, 7, 8, and Conditions 2, 3, 4, and 5 are patterns in which attackers do not go through only Steps 4, 6, 7, and 8.…”
mentioning
confidence: 99%
“…• HUC Packet Transmitter: A proxy tool used to intercept and redirect Transmission Control Protocol (TCP) connections in order to obfuscate attackers'communications with victim networks. Recently, detection utilizing Endpoint Detection and Response (EDR) * 1 on each computer is becoming more common [2]. As part of EDR, malware detection based on file name or hash is one of the more popular methods [3].…”
Section: Introductionmentioning
confidence: 99%