2020
DOI: 10.1007/s42979-020-00226-8
|View full text |Cite
|
Sign up to set email alerts
|

A Methodology for Runtime Detection and Extraction of Threat Patterns

Abstract: As the confidentiality and integrity of modern health infrastructures is threatened by intrusions and real-time attacks related to privacy and cyber-security, there is a need for proposing novel methodologies to predict future incidents and identify new threat patterns. The main scope of this article is to propose an advanced extension to current Intrusion Detection System (IDS) solutions, which (i) harvests the knowledge out of health data sources or network monitoring to construct models for new threat patte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…Moreover, the information discovered by ISADT can be used by other tools and methodologies, like the one presented in [21], to predict future incidents and identify new threat patterns in each single asset. This information can also be used to detect the cyber-security and the privacy risks in a device before an information exchange is done, as presented in [22].…”
Section: Discussionmentioning
confidence: 99%
“…Moreover, the information discovered by ISADT can be used by other tools and methodologies, like the one presented in [21], to predict future incidents and identify new threat patterns in each single asset. This information can also be used to detect the cyber-security and the privacy risks in a device before an information exchange is done, as presented in [22].…”
Section: Discussionmentioning
confidence: 99%
“…Upon reception of the vulnerability report, KEA performs a machine learning analysis using the log events generated in the infrastructure in order to detect new threat patterns that could potentially harm the system [24]. New threat patterns are added to the VDM, which enriches the vulnerability report to be shared with other CUREX tools.…”
mentioning
confidence: 99%