Real-time Detection and Reconstruction of Advanced Cyber Attack Campaigns from Host Event Logs using Provenance Tags and Customizable Policy
A system and method for identifying cyber attacks and events and reconstruction thereof with improvements in efficiency Background: Cyber security has grown to be a more complex field as technology evolved. Cyber attacks (or CNAs, computer network attacks) are an exploitation of computer systems or networks and often use malicious coding to alter...
Published: 5/2/2023
|
Inventor(s): R. Sekar, Junao Wang, Md Nahid Hossain, Scott Stoller, Sadegh Milajerdi, Birhanu Eshete, Rigel Gjomemo, V.N. Venkatakrishnan
Keywords(s):
Category(s): Campus > Stony Brook University, Technology Classifications > Computer, Technology Classifications > Information Technology
|