Exploring Intruder Key Trace based on Complicated System Call Graph by Recursive Dominator Mechanism

碩士 === 國立臺灣科技大學 === 資訊工程系 === 107 === The existing security equipment detects attack by applying host-based intrusion detection system(HIDS), User and Entity Behavior Analytics(UEBA) and anti-virus software. Unfortunately, huge amounts of logs are generated by the equipment, and correlating all of t...

Full description

Bibliographic Details
Main Authors: Chi-Yuan Hsieh, 謝奇元
Other Authors: Hahn-Ming Lee
Format: Others
Language:en_US
Published: 2018
Online Access:http://ndltd.ncl.edu.tw/handle/4f28m3