Malicious Behavior Detection using Windows Audit Logs

@inproceedings{Berlin2015MaliciousBD,
  title={Malicious Behavior Detection using Windows Audit Logs},
  author={Konstantin Berlin and David Slater and Joshua Saxe},
  booktitle={AISec@CCS},
  year={2015}
}
As antivirus and network intrusion detection systems have increasingly proven insufficient to detect advanced threats, large security operations centers have moved to deploy endpoint-based sensors that provide deeper visibility into low-level events across their enterprises. Unfortunately, for many organizations in government and industry, the installation, maintenance, and resource requirements of these newer solutions pose barriers to adoption and are perceived as risks to organizations… CONTINUE READING
Highly Cited
This paper has 24 citations. REVIEW CITATIONS
Recent Discussions
This paper has been referenced on Twitter 31 times over the past 90 days. VIEW TWEETS
17 Citations
0 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 17 extracted citations

Similar Papers

Loading similar papers…