Login / Signup
POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting.
Sadegh M. Milajerdi
Birhanu Eshete
Rigel Gjomemo
V. N. Venkatakrishnan
Published in:
CoRR (2019)
Keyphrases
</>
countermeasures
databases
intrusion detection
cyber security
cyber crime
feature space
cyber attacks
support vector
human behavior
behavior patterns
kernel function
kernel methods
normal behavior
data sets
wireless sensor networks
record linkage