Title
Preemptive intrusion detection
Abstract
This paper presents a system named SPOT to achieve high accuracy and preemptive detection of attacks. We use security logs of real-incidents that occurred over a six-year period at National Center for Supercomputing Applications (NCSA) to evaluate SPOT. Our data consists of attacks that led directly to the target system being compromised, i.e., not detected in advance, either by the security analysts or by intrusion detection systems. Our approach can detect 75 percent of attacks as early as minutes to tens of hours before attack payloads are executed.
Year
DOI
Venue
2014
10.1145/2600176.2600197
HotSoS
Keywords
Field
DocType
security and protection,factor graph,cyber-system,tagging,graphical model,credential stealing attack,security incident,timeliness
Factor graph,Host-based intrusion detection system,Supercomputer,Computer security,Computer science,Intrusion prevention system,Graphical model,Intrusion detection system,Payload
Conference
Citations 
PageRank 
References 
2
0.42
1
Authors
5
Name
Order
Citations
PageRank
Phuong Cao1334.90
Key-whan Chung292.62
Zbigniew Kalbarczyk31896159.48
Ravishankar K. Iyer43489504.32
Adam J. Slagell5395.85