A Study of Detection of Structurally Anomalous Logins within Enterprise Networks for Network Security of Organizations

Authors

  • Jigyasa Amity University, Noida, India

Keywords:

network lateral movement, anomalous logins, pattern mining

Abstract

To detect lateral motions that target remote vulnerabilities, often network intrusion detection systems use byte sequences. In this method, attackers circumvent anti-tampering controls by acquiring legitimate keys and using them to relay data from two separate devices without triggering irregular network traffic. In Credential-based Lateral Movement, we name this method. We use the capability of our technologies to recognize the lateral activity of this kind.

Downloads

Download data is not yet available.

Downloads

Published

21-08-2022

Issue

Section

Articles

How to Cite

[1]
Jigyasa, “A Study of Detection of Structurally Anomalous Logins within Enterprise Networks for Network Security of Organizations”, IJRESM, vol. 5, no. 8, pp. 58–65, Aug. 2022, Accessed: Nov. 23, 2024. [Online]. Available: https://journal.ijresm.com/index.php/ijresm/article/view/2321