2018
DOI: 10.1186/s13635-018-0074-y
|View full text |Cite
|
Sign up to set email alerts
|

Foundations and applications of artificial Intelligence for zero-day and multi-step attack detection

Abstract: Behind firewalls, more and more cybersecurity attacks are specifically targeted to the very network where they are taking place. This review proposes a comprehensive framework for addressing the challenge of characterising novel complex threats and relevant countermeasures. Two kinds of attacks are particularly representative of this issue: zero-day attacks that are not publicly disclosed and multi-step attacks that are built of several individual steps, some malicious and some benign. Two main approaches are … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
17
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(17 citation statements)
references
References 68 publications
0
17
0
Order By: Relevance
“…Many security challenges have been addressed by means of adaptive techniques, involving both supervised learning and clustering. These include one step and especially continuous authentication, network intrusion detection, spam filtering, defacement response and malware analysis (see, e.g., [29,30]). In such applications examples are often continuously generated, and online learning methods are needed.…”
Section: Keyed Learning Of a Defacement Detectormentioning
confidence: 99%
“…Many security challenges have been addressed by means of adaptive techniques, involving both supervised learning and clustering. These include one step and especially continuous authentication, network intrusion detection, spam filtering, defacement response and malware analysis (see, e.g., [29,30]). In such applications examples are often continuously generated, and online learning methods are needed.…”
Section: Keyed Learning Of a Defacement Detectormentioning
confidence: 99%
“…This may allow for some useful counteraction, such as raising an alarm, blocking malicious content, or simply switching to higher protection thresholds and more verbose logs. For examples and surveys of applications, see [11][12][13][14][15][16][17][18].…”
Section: Definition and Frameworkmentioning
confidence: 99%
“…Applications of keyed learning fall within the scope of exploratory adversarial learning [2]. This context is generally appropriate for anomaly detection, which comprises several application domains, including intrusion detection [3,5,6,14,25,33,34], attack and malware analysis [7,16,[35][36][37], defacement response [8,17,38,39], Web promotional infection detection [40], and biometric and continuous user authentication [11,18].…”
Section: Applicationsmentioning
confidence: 99%
“…Covered Attacks in Discussed IDS(85 IDSs Manuscripts listed inTable A.1)could be used to train machine learning models used for anomaly detection. By employing extendable datasets and a standardized method for dataset generation, alongside the advancement in ML[72],[73], zero-day detection could be integrated into anomaly-based IDSs. Later in Section IV, our presented threat taxonomy highlights the percentage of attack coverage achieved by current IDSs.To further analyze the last decade research on IDSs, it is important to consider the algorithms used.…”
mentioning
confidence: 99%