Automated Detection and Analysis using Mathematical Calculations

A compromised system usually shows some form of anomalous behaviour. Examples include new processes, services, or outbound traffic. In an ideal environment, rules are configured to alert on such anomalies, where an analyst would perform further analysis to determine a possible compromise. However,...
By Lionel Teo
May 17, 2018

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg