Abstract
With the advent of Advanced Persistent Threats (APTs), it has become increasingly difficult to identify and understand attacks on computer systems. This paper presents a system capable of explaining anomalous behavior within network-enabled user sessions by describing and interpreting kernel event anomalies detected by their deviation from normal behavior. The prototype has been developed at the Josef Ressel Center for Unified Threat Intelligence on Targeted Attacks (TARGET) at St. Pölten University of Applied Sciences.
Author supplied keywords
Cite
CITATION STYLE
Luh, R., & Schrittwieser, S. (2020). Advanced threat intelligence: detection and classification of anomalous behavior in system processes. Elektrotechnik Und Informationstechnik, 137(1), 38–44. https://doi.org/10.1007/s00502-019-00780-x
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.