
An overview of the main attack detection techniques, based on signatures and statistical analysis. Analysis of the weaknesses in defensive approaches. Techniques for obfuscating software and network traffic. The effects of obfuscation on the detection of cyber-attacks. Sophisticated attacks designed to circumvent threat detection systems based on network traffic analysis or process monitoring. Advanced defence techniques for detecting obfuscated and evasive attacks. Advanced defence techniques for detecting sophisticated attacks. Machine and deep learning to detect cyber-attacks.
Signature-based approaches:
Approaches based on statistical analysis:
Analysis of the weaknesses in defensive and system:
Code obfuscation:
Network traffic obfuscation:
The effects of obfuscation on the detection of cyber-attacks:
Attacks designed to evade dynamic analysis systems:
Network traffic attacks:
Social Engineering:
Approaches to tackle obfuscated attacks:
Approaches for sophisticated attacks:
Machine and Deep Learning for Cybersecurity:
Examples of network traffic obfuscation and software applications.
Social engineering attacks
Machine learning based approaches to detect cyberattacks.
Approaches for sophisticated attacks:
Machine and Deep Learning for Cybersecurity:
Fill in all sections of the form and click CONFIRM.
Diamo valore alla tua Privacy
Questo sito utilizza i cookie per migliorare la tua esperienza di navigazione, offrirti pubblicità o contenuti personalizzati e analizzare il nostro traffico. Cliccando su “Accetta tutti” , acconsenti al nostro utilizzo dei cookie.