A Study of Detection of Structurally Anomalous Logins within Enterprise Networks for Network Security of Organizations
Keywords:
network lateral movement, anomalous logins, pattern miningAbstract
To detect lateral motions that target remote vulnerabilities, often network intrusion detection systems use byte sequences. In this method, attackers circumvent anti-tampering controls by acquiring legitimate keys and using them to relay data from two separate devices without triggering irregular network traffic. In Credential-based Lateral Movement, we name this method. We use the capability of our technologies to recognize the lateral activity of this kind.
Downloads
Download data is not yet available.
Downloads
Published
21-08-2022
Issue
Section
Articles
License
Copyright (c) 2022 Jigyasa

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
[1]
Jigyasa, “A Study of Detection of Structurally Anomalous Logins within Enterprise Networks for Network Security of Organizations”, IJRESM, vol. 5, no. 8, pp. 58–65, Aug. 2022, Accessed: Sep. 16, 2025. [Online]. Available: https://journal.ijresm.com/index.php/ijresm/article/view/2321