Essays about: "Indicator of compromise IOC"

Found 3 essays containing the words Indicator of compromise IOC.

  1. 1. Method of finding the minimum number of sources of indicators of compromise to cover the maximum set

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Kateryna Sydorenko; [2023]
    Keywords : Indicator of Compromise; Set Cover Problem; Maximum Coverage; Open Threat Exchange;

    Abstract : Background. With the increasing demand for cybersecurity, there is a growing interest in understanding cyber-attack surfaces and vectors. READ MORE

  2. 2. Understanding the behaviour of  IOCs during their lifecycle

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Navya sree Godavarti; Sivani Modali; [2022]
    Keywords : Indicator of compromise IOC ; Cybersecurity; Confidence level of IOC.;

    Abstract : An indicator of compromise is a digital artefact that detects data compromise. They sense the compromise happening, trace the intrusion and collect data. This data includes breached data and the address. All indicators have a limited period of a lifetime, in which these work the best time in their peak. READ MORE

  3. 3. Improving the precision of an Intrusion Detection System using Indicators of Compromise : - a proof of concept -

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Gisela Lejonqvist; Oskar Larsson; [2018]
    Keywords : Intrusion Detection System; Indicator Of Compromise; False Positives; Snort;

    Abstract : The goal of this research is to improve an IDS so that the percentage of true positives is high, an organisation can cut time and cost and use its resources in a more optimal way. This research goal was to prove that the precision of an intrusion detection system (IDS), in terms of producing lower rate of false positives or higher rate of true alerts, can be achieved by parsing indicators of compromise (IOC) to gather information, that combined with system-specific knowledge will be a solid base for manual fine-tuning of IDS-rules. READ MORE