The MITRE ATT&CK framework counts 530 ways to exploit enterprise systems-And every month new techniques are added. Cybersecurity vendors continuously offer new detective solutions, but purchasing, deploying, and maintaining a specific product is expensive. It's time to reflect on the underlying principles of effective anomaly-based intrusion detection.
CITATION STYLE
Skopik, F., Wurzenberger, M., & Landauer, M. (2021). The Seven Golden Principles of Effective Anomaly-Based Intrusion Detection. IEEE Security and Privacy, 19(5), 36–45. https://doi.org/10.1109/MSEC.2021.3090444
Mendeley helps you to discover research relevant for your work.