2019 15th International Conference on Network and Service Management (CNSM) 2019
DOI: 10.23919/cnsm46954.2019.9012700
|View full text |Cite
|
Sign up to set email alerts
|

Host in Danger? Detecting Network Intrusions from Authentication Logs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
13
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(14 citation statements)
references
References 18 publications
0
13
0
1
Order By: Relevance
“…The host-based detection methods are mainly to detect whether there are malicious behaviours on independent hosts such as the execution of malicious software, the behaviour of applications trying to modify certain files. Bian et al 5 extracted graph-based features from authentication logs of the target host during the APT lateral movement stage and then used these features to train the machine learning model to detect APT. Bai et al 6 used machine learning methods to detect abnormal behaviours of Remote Desktop Protocol (RDP) event logs during the APT lateral movement stage to detect APT.…”
Section: Introductionmentioning
confidence: 99%
“…The host-based detection methods are mainly to detect whether there are malicious behaviours on independent hosts such as the execution of malicious software, the behaviour of applications trying to modify certain files. Bian et al 5 extracted graph-based features from authentication logs of the target host during the APT lateral movement stage and then used these features to train the machine learning model to detect APT. Bai et al 6 used machine learning methods to detect abnormal behaviours of Remote Desktop Protocol (RDP) event logs during the APT lateral movement stage to detect APT.…”
Section: Introductionmentioning
confidence: 99%
“…To better support the processes of attack mitigation, it is helpful to first understand how an attack transpires in practice. Recent work that analyzed the network logs or process logs for anomaly detection [3]- [7] and malicious authentication detection [8]- [10] have revealed useful insights to address attacks in networks. The time elapsed between the precursor event and an attack is defined as the lead time.…”
Section: Introductionmentioning
confidence: 99%
“…Analyzing attacks in any large-scale or complex network require awareness of the sequence of events that is encountered by the network components. While researchers have focused on specific components [7], [10] depending on their target problem, answering how attacks occur needs a more integrated approach towards correlation-based log-mining [13]. Our work is novel in that it considers the flow connection-specific events along with their inter-component relationships to increase the lead times to identification of an attack boosting network attack prediction schemes.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…A extrac ¸ão de características do conjunto de dados é a etapa mais crítica da criac ¸ão de um algoritmo de aprendizado de máquina, pois as características afetam diretamente o ajuste dos parâmetros do modelo e o desempenho de classificac ¸ão. Entre os métodos para extrac ¸ão de características e representac ¸ão dos fluxos de rede existem os convencionais, que quantificam informac ¸ões dos pacotes, como número de bytes e quantidade de pacotes [Lobato et al 2017], ou representac ¸ões mais complexas através de grafos [Sanz et al 2018, Bian et al 2019] ou até por imagem [Liu et al 2019]. Entretanto, essas características não refletem a dependência temporal entre os pacotes, e nem comportamentos periódicos gerados pela automatizac ¸ão dos ataques.…”
Section: Introduc ¸ãOunclassified