YoVDO

ShadeWatcher: Recommendation-Guided Cyber Threat Analysis Using System Audit Records

Offered By: IEEE via YouTube

Tags

Cybersecurity Courses Recommendation Systems Courses Knowledge Graphs Courses

Course Description

Overview

Explore a novel approach to cyber threat analysis in this 21-minute IEEE conference talk. Delve into the ShadeWatcher system, which utilizes recommendation-guided techniques and system audit records to enhance threat detection. Learn about knowledge graph building, connectivity modeling, and machine learning applications in cybersecurity. Examine the effectiveness and efficiency of this innovative method through comprehensive evaluations and case studies.

Syllabus

Intro
Cyber Threats Are Everywhere
Analyze Cyber Threat using System Auditing
Previous Approaches using Audit Records
Recommendation as a Similar Problem
Recommendation-guided Cyber Threat Analysis
Knowledge Graph Builder (cont.)
First-order Connectivity Modeling
Higher-order Connectivity Modeling
Learning to Cyber Threat Analysis
Evaluation
Effectiveness in Cyber Threat Detection
Study of Recommendation-guided Analysis
System Efficiency
Conclusion


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Mining Massive Datasets
Stanford University via edX
Nearest Neighbor Collaborative Filtering
University of Minnesota via Coursera
Practical Deep Learning For Coders
fast.ai via Independent
Data Mining: Theories and Algorithms for Tackling Big Data | 数据挖掘:理论与算法
Tsinghua University via edX
ความรู้พื้นฐานเกี่ยวกับบิ๊กดาตา | Big Data Concept
Sukhothai Thammathirat Open University via ThaiMOOC