The Seven Golden Principles of Effective Anomaly-Based Intrusion Detection

3Citations
Citations of this article
32Readers
Mendeley users who have this article in their library.

Abstract

The MITRE ATT&CK framework counts 530 ways to exploit enterprise systems-And every month new techniques are added. Cybersecurity vendors continuously offer new detective solutions, but purchasing, deploying, and maintaining a specific product is expensive. It's time to reflect on the underlying principles of effective anomaly-based intrusion detection.

Cite

CITATION STYLE

APA

Skopik, F., Wurzenberger, M., & Landauer, M. (2021). The Seven Golden Principles of Effective Anomaly-Based Intrusion Detection. IEEE Security and Privacy, 19(5), 36–45. https://doi.org/10.1109/MSEC.2021.3090444

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free