Ye-Seul Kil1,#, Yu-Ran Jeon1,#, Sun-Jin Lee1, Il-Gu Lee1,2,*
CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1473-1493, 2024, DOI:10.32604/cmes.2024.052637
- 27 September 2024
Abstract With the rise of remote work and the digital industry, advanced cyberattacks have become more diverse and complex in terms of attack types and characteristics, rendering them difficult to detect with conventional intrusion detection methods. Signature-based intrusion detection methods can be used to detect attacks; however, they cannot detect new malware. Endpoint detection and response (EDR) tools are attracting attention as a means of detecting attacks on endpoints in real-time to overcome the limitations of signature-based intrusion detection techniques. However, EDR tools are restricted by the continuous generation of unnecessary logs, resulting in poor detection… More >