A Methodology for Runtime Detection and Extraction of Threat Patterns

6Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

As the confidentiality and integrity of modern health infrastructures is threatened by intrusions and real-time attacks related to privacy and cyber-security, there is a need for proposing novel methodologies to predict future incidents and identify new threat patterns. The main scope of this article is to propose an advanced extension to current Intrusion Detection System (IDS) solutions, which (i) harvests the knowledge out of health data sources or network monitoring to construct models for new threat patterns and (ii) encompasses methods for detecting threat patterns utilizing also advanced unsupervised machine learning data analytic methodologies. Although the work is motivated by the health sector, it is developed in a manner that is directly applicable to other domains.

Cite

CITATION STYLE

APA

Bellas, C., Naskos, A., Kougka, G., Vlahavas, G., Gounaris, A., Vakali, A., … Granadillo, G. G. (2020). A Methodology for Runtime Detection and Extraction of Threat Patterns. SN Computer Science, 1(5). https://doi.org/10.1007/s42979-020-00226-8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free