Hunting Observable Objects for Indication of Compromise
Abstract
References
Index Terms
- Hunting Observable Objects for Indication of Compromise
Recommendations
A Malware Detection Framework Based on Forensic and Unsupervised Machine Learning Methodologies
ICSCA '20: Proceedings of the 2020 9th International Conference on Software and Computer ApplicationsThe detection of malware intrusion requires the identification of its signature. However, it is a complex task due to the malware sophisticated ability to evade security mechanisms deployed by cybersecurity practitioners. Evasion is possible due to ...
Automated Pattern Inference Based on Repeatedly Observed Malware Artifacts
ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and SecurityThreat Intelligence comprises the concept of Indicators of Compromise, which are commonly used similar to classical intrusion detection signatures. However, data quality is often of limited quality with regard to this use case. The quality of these ...
Explainable artificial intelligence envisioned security mechanism for cyber threat hunting
AbstractCyber threat hunting proactively searches for cyber threats, which are undetected by the traditional defense mechanisms. It scans deep to identify malicious programs (ie, malware) that escape from detection. It is important because sophisticated ...
Comments
Information & Contributors
Information
Published In
In-Cooperation
- Universität Hamburg: Universität Hamburg
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 349Total Downloads
- Downloads (Last 12 months)13
- Downloads (Last 6 weeks)1
Other Metrics
Citations
Cited By
View allView Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in