{"id":651,"date":"2022-11-28T22:21:22","date_gmt":"2022-11-28T22:21:22","guid":{"rendered":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/?p=651"},"modified":"2022-12-11T08:39:46","modified_gmt":"2022-12-11T08:39:46","slug":"threat-detection-and-analysis-using-large-graphs","status":"publish","type":"post","link":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/2022\/11\/28\/threat-detection-and-analysis-using-large-graphs\/","title":{"rendered":"Threat detection and analysis using large graphs"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.18.0&#8243; text_font=&#8221;|600|||||||&#8221; header_font=&#8221;|600|||||||&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p><span style=\"font-size: medium\">The project objective is to investigate current and new attack vectors using data from both the traditional security ecosystem and beyond the organization perimeter. Beyond the organization perimeter, there is a wide variety of Internet infrastructure data maintained by third parties and that is accessible through freeware or subscription-based web APIs and repositories, including DNS, WHOIS, BGP routing, IP geolocation, IP\/domains\u2019 blacklist, malware file connection, user\u2019s devices, and users\u2019 digital fingerprints\/footprints.\u00a0 A new graph model called <em>activity and event network (AEN)<\/em> model has been developed to capture and analyze in real-time relevant data from the above sources for the purpose of detecting and analyzing long-term and stealth attacks in computing and Cyberphysical networks.\u00a0<\/span><\/p>\n<p><span style=\"font-size: medium\">The AEN framework uses large dynamic uncertain graphs to model and observe an interrelated network of activities and events over a period and across a broad set of hosts and identify known and hidden attack patterns.<\/span><\/p>\n<p><span style=\"font-size: medium\">\u00a0<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The project objective is to investigate current and new attack vectors using data from both the traditional security ecosystem and beyond the organization perimeter. Beyond the organization perimeter, there is a wide variety of Internet infrastructure data maintained by third parties and that is accessible through freeware or subscription-based web APIs and repositories, including DNS, [&hellip;]<\/p>\n","protected":false},"author":17669,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p><span style=\"font-weight: 400;\">The project objective is to investigate current and new attack vectors using data from both the traditional security ecosystem and beyond the organization perimeter. Beyond the organization perimeter, there is a wide variety of Internet infrastructure data maintained by third parties and that is accessible through freeware or subscription-based web APIs and repositories, including DNS, WHOIS, BGP routing, IP geolocation, IP\/domains\u2019 blacklist, malware file connection, user\u2019s devices, and users\u2019 digital fingerprints\/footprints.\u00a0 A new graph model called <\/span><i><span style=\"font-weight: 400;\">activity and event network (AEN)<\/span><\/i><span style=\"font-weight: 400;\"> model has been developed to capture and analyze in real-time relevant data from the above sources for the purpose of detecting and analyzing long-term and stealth attacks in computing and Cyberphysical networks.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">The AEN framework uses large dynamic uncertain graphs to model and observe an interrelated network of activities and events over a period and across a broad set of hosts and identify known and hidden attack patterns.<\/span><\/p>","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[15,14],"tags":[],"class_list":["post-651","post","type-post","status-publish","format-standard","hentry","category-current-projects","category-research"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/users\/17669"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/comments?post=651"}],"version-history":[{"count":7,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/651\/revisions"}],"predecessor-version":[{"id":1016,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/651\/revisions\/1016"}],"wp:attachment":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/media?parent=651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/categories?post=651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/tags?post=651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}