2018
DOI: 10.1016/j.future.2018.06.055
|View full text |Cite
|
Sign up to set email alerts
|

Detection of advanced persistent threat using machine-learning correlation analysis

Abstract: Item Type Article Authors Ghafir, Ibrahim; Hammoudeh, M.; Prenosil, V.; Han, L.; Hegarty, R.; Rabie, K.; Aparicio-Navarro, F.J. Citation Ghafir I, Hammoudeh M, Prenosil V (et al) Detection of advanced persistent threat using machine-learning correlation analysis. Future Generation Computer Systems. 89: 349-359. Rights Citation: Ghafir I, Hammoudeh M, Prenosil V (et al) Detection of advanced persistent threat using machine-learning correlation analysis. Future Generation Computer Systems. 89: 349-359. AbstractA… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
122
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
2
2

Relationship

3
7

Authors

Journals

citations
Cited by 231 publications
(123 citation statements)
references
References 24 publications
0
122
0
1
Order By: Relevance
“…Another approach [53] introduced a ML-based approach named MLAPT to identify and predict APTs. According to the authors, their system had the ability of early prediction of APT attacks.…”
Section: Countering An Advanced Persistent Threatmentioning
confidence: 99%
“…Another approach [53] introduced a ML-based approach named MLAPT to identify and predict APTs. According to the authors, their system had the ability of early prediction of APT attacks.…”
Section: Countering An Advanced Persistent Threatmentioning
confidence: 99%
“…They often lead to numerous and significant losses, the essential disruption of production, and the destruction of the environment, etc. [11][12][13][14].…”
Section: Introductionmentioning
confidence: 99%
“…In particular, this IDS focuses on detecting a 5-steps MSA, in real-time, without previous training process. The main goal of this MSA is to create a Point of Entry (PoE) to a targeted machine, which could be used for the completion of an Advanced Persistent Threat (APT) like attack [6]. As we demonstrated in [7], a Fuzzy Cognitive Map (FCM) [8] can be used to incorporate the PoL into the detection process.…”
Section: Introductionmentioning
confidence: 99%