Exploring Intruder Key Trace based on Complicated System Call Graph by Recursive Dominator Mechanism
碩士 === 國立臺灣科技大學 === 資訊工程系 === 107 === The existing security equipment detects attack by applying host-based intrusion detection system(HIDS), User and Entity Behavior Analytics(UEBA) and anti-virus software. Unfortunately, huge amounts of logs are generated by the equipment, and correlating all of t...
Main Authors: | Chi-Yuan Hsieh, 謝奇元 |
---|---|
Other Authors: | Hahn-Ming Lee |
Format: | Others |
Language: | en_US |
Published: |
2018
|
Online Access: | http://ndltd.ncl.edu.tw/handle/4f28m3 |
Similar Items
-
Searching for an intruder on graphs and their subdivisions
by: Bernshteyn, A., et al.
Published: (2022) -
Correlating Temporal Thumbprints for Tracing Intruders
by: Jianhua Yang, et al.
Published: (2006-08-01) -
Intruder capture algorithms considering visible intruders
by: Jonghoek Kim
Published: (2019-05-01) -
On the Critical Clustering Temperature of Granular Gases with Intruders
by: Wan-Lin Hsieh, et al.
Published: (2010) -
Aggression and dominance in cichlids in resident-intruder tests: the role of environmental enrichment
by: Vincent Nijman, et al.