7,426 research outputs found

    ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks

    Full text link
    Despite the fact that cyberattacks are constantly growing in complexity, the research community still lacks effective tools to easily monitor and understand them. In particular, there is a need for techniques that are able to not only track how prominently certain malicious actions, such as the exploitation of specific vulnerabilities, are exploited in the wild, but also (and more importantly) how these malicious actions factor in as attack steps in more complex cyberattacks. In this paper we present ATTACK2VEC, a system that uses temporal word embeddings to model how attack steps are exploited in the wild, and track how they evolve. We test ATTACK2VEC on a dataset of billions of security events collected from the customers of a commercial Intrusion Prevention System over a period of two years, and show that our approach is effective in monitoring the emergence of new attack strategies in the wild and in flagging which attack steps are often used together by attackers (e.g., vulnerabilities that are frequently exploited together). ATTACK2VEC provides a useful tool for researchers and practitioners to better understand cyberattacks and their evolution, and use this knowledge to improve situational awareness and develop proactive defenses

    Attack2vec: Leveraging temporal word embeddings to understand the evolution of cyberattacks

    Full text link
    Despite the fact that cyberattacks are constantly growing in complexity, the research community still lacks effective tools to easily monitor and understand them. In particular, there is a need for techniques that are able to not only track how prominently certain malicious actions, such as the exploitation of specific vulnerabilities, are exploited in the wild, but also (and more importantly) how these malicious actions factor in as attack steps in more complex cyberattacks. In this paper we present ATTACK2VEC, a system that uses temporal word embeddings to model how attack steps are exploited in the wild, and track how they evolve. We test ATTACK2VEC on a dataset of billions of security events collected from the customers of a commercial Intrusion Prevention System over a period of two years, and show that our approach is effective in monitoring the emergence of new attack strategies in the wild and in flagging which attack steps are often used together by attackers (e.g., vulnerabilities that are frequently exploited together). ATTACK2VEC provides a useful tool for researchers and practitioners to better understand cyberattacks and their evolution, and use this knowledge to improve situational awareness and develop proactive defenses.Accepted manuscrip

    Electric-Field-Induced Resonant Spin Polarization in a Two-Dimensional Electron Gas

    Get PDF
    Electric response of spin polarization in two-dimensional electron gas with structural inversion asymmetry subjected to a magnetic field was studied by means of the linear and non-linear theory and numerical simulation with the disorder effect. It was found by Kubo linear reponse theory that an electric resonant response of spin polarization occurs when the Fermi surface is located near the crossing of two Landau levels, which is induced from the competition between the spin-orbit coupling and Zeeman splitting. The scaling behavior was investigated with a simplified two-level model by non-linear method, and the resonant peak value is reciprocally proportional to the electric field at low temperatures and to temperature for finite electric fields. Finally numerical simulation illustrated that impurity potential opens an enegy gap near the resonant point and suppresses the effect gradually with the increasing strength of disorder. This resonant effect may provide an efficient way to control spin polarization by an external electric field.Comment: 6 pages, 5 figure

    Accelerating data retrieval steps in XML documents

    Get PDF
    • …
    corecore