Threat detection and mitigation through run-time introspection and instrumentation

作者: Nachiketh Rao Potlapally , Donald Lee Bailey , Hassan Sultan , John Schweitzer , Gregory Branchek Roth

DOI:

关键词:

摘要: A system and method for threat detection mitigation through run-time introspection. The comprising receiving a request to monitor computing environment. Based on the received request, further includes determining set of introspection points monitoring receive environment, measuring at individual obtain measurements, generating graph resources in wherein correlates other based least part whether perform security action an evaluation indicates

参考文章(26)
Nicholas Andrew Heard, Joshua Charles Neil, Melissa Turcotte, Anomaly detection to identify coordinated group attacks in computer networks ,(2013)
Acar Tamersoy, Sandeep Bhatkar, Darren Shou, Zhi Kai Li, Tao Cheng, Elias Khalil, Jie Fu, Kevin Alejandro Roundy, Fanglu Guo, Sanjay Sawhney, Systems and methods for using event-correlation graphs to detect attacks on computing systems ,(2013)
Michael Andrews, Dennis Gursky, Sharat Shroff, Melissa Lauren Benua, Cross-site scripting prevention in dynamic content ,(2010)
Paolo Ferragina, Aristides Gionis, Debora Donato, Claudio Corsi, Query log mining for detecting spam hosts ,(2008)
Pratyusa Kumar Manadhata, Marc R. Eisenbarth, Stuart Haber, Sandeep Yadav, William G. Horne, Prasad V. Rao, Inferring a state of behavior through marginal probability estimation ,(2012)
Edward Stanley Luce, Kevin Michael Gatenby, Method of and apparatus for casting metal slab ,(2013)
Amnon Lotem, Lior Ben Naon, Gideon Cohen, Method for simulation aided security event management ,(2013)