A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics

作者: Gregory Vert , Ann Leslie Claesson-Vert , Jesse Roberts , Erica Bott

DOI: 10.1007/978-3-319-58424-9_3

关键词:

摘要: The aim of this chapter is to apply an advanced journal-published state machine engine the analysis variables that can detect presence Advanced Persistent Threat (APT) and other malware. Finite Angular State Velocity Machine (FAST-VM) model analyze large amounts information over a temporal space. ability data time key factor in detecting Threat. Experimentally, FAST-VM has analyzed 10,000,000 variable vectors around 24 ms. This demonstrates application “big data” area cyber security. Transition capability address these challenges based on previous published work with Spicule. It reduces high order changes have subtle them threat easy comprehend also predict future threats. unifies three major areas IDS (anomaly, misuse, specification) into single model. mathematical shown great computational possibilities prediction, classification, detection, but it never been mapped system’s variables. technology seeks determine how map system APT. Successful development could dramatically affect all facets computation, especially autonomous vehicles networks. will present theory then technology.

参考文章(22)
Mohammad Sazzadul Hoque, Md. Abdul Mukit, Md. Abu Naser Bikas, AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM International Journal of Network Security & Its Applications. ,vol. 4, pp. 109- 120 ,(2012) , 10.5121/IJNSA.2012.4208
Evangelos Triantaphyllou, Greg Vert, Security Level Determination Using Branes for Contextual Based Global Processing: An Architecture. Security and Management. pp. 346- 350 ,(2009)
Saranya Chandran, P Hrudya, Prabaharan Poornachandran, None, An efficient classification model for detecting advanced persistent threat advances in computing and communications. pp. 2001- 2009 ,(2015) , 10.1109/ICACCI.2015.7275911
J. James, W. Bricken, A boundary notation for visual mathematics ieee symposium on visual languages. pp. 267- 269 ,(1992) , 10.1109/WVL.1992.275745
Gensuo Han, Koji Kagawa, Towards a Web-based program visualization system using Web3D information technology based higher education and training. pp. 1- 4 ,(2012) , 10.1109/ITHET.2012.6246071
Zulaiha Ali Othman, Azuraliza Abu Bakar, Intesar Etubal, Improving signature detection classification model using features selection based on customized features intelligent systems design and applications. pp. 1026- 1031 ,(2010) , 10.1109/ISDA.2010.5687051
Robert Mitchell, Ing-Ray Chen, Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems IEEE Transactions on Dependable and Secure Computing. ,vol. 12, pp. 16- 30 ,(2015) , 10.1109/TDSC.2014.2312327
Gregory Vert, S. S. Iyengar, Vir Phoha, Security models for contextual based global processing an architecture and overview Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies - CSIIRW '09. pp. 53- ,(2009) , 10.1145/1558607.1558668
R.F. Erbacher, K.L. Walker, D.A. Frincke, Intrusion and misuse detection in large-scale systems IEEE Computer Graphics and Applications. ,vol. 22, pp. 38- 47 ,(2002) , 10.1109/38.974517
Mohammad Sazzadul Hoque, An Implementation of Intrusion Detection System Using Genetic Algorithm arXiv: Cryptography and Security. ,(2012) , 10.5121/IJNSA.2012.4208