Search Results

Malicious Behavior Detection using Windows Audit Logs

1 code implementation25 Aug 2015

As antivirus and network intrusion detection systems have increasingly proven insufficient to detect advanced threats, large security operations centers have moved to deploy endpoint-based sensors that provide deeper visibility into low-level events across their enterprises.

Cryptography and Security

You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks

1 code implementation16 Nov 2023

To remedy these critical detection blind spots, we propose the idea of adaptive misuse detection, which utilizes machine learning to compare incoming events to SIEM rules on the one hand and known-benign events on the other hand to discover successful evasions.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.