1
1
---
2
- title : Threat and Anomaly Detection
2
+ title : Dependable AI-driven Threat and Anomaly Detection
3
3
subtitle :
4
4
type : topic
5
5
topicUrl : /topics/ThreatDetection
@@ -23,17 +23,15 @@ and networks from potential risks and are essential components of a
23
23
robust cybersecurity strategy. Threat detection involves identifying and
24
24
recognising potential cyber threats such as malware, hacking attempts,
25
25
or other malicious activities that can compromise the security and
26
- integrirty of computer systems, networks, or data. Anomaly detection, on
26
+ integrity of computer systems, networks, or data. Anomaly detection, on
27
27
the other hand, focuses on discovering abnormal or unusual patterns in
28
- data that deviate significantly from the expected behavior. Applications
29
- fiels include networks and cloud infrastructure, industrial control
30
- systems, automotive, healthcare systems and many others.
28
+ data that deviate significantly from the expected behaviour.
29
+
30
+
31
31
32
32
** Our focus:**
33
+ - Dependable AI-driven threat and anomaly detection focussing on the following challenges:
34
+ - trade-off between resource-efficient and accurate detection of threats and anomalies
35
+ - robustness to open-world challenges such as adversarial machine learning attacks and concept drift
36
+ - Enhanced Federated Learning for higher accuracy, lower resource overhead and enhanced confidentiality
33
37
34
- - Design and development of AI-based threat and anomaly detection
35
- algorithms
36
- - Monitoring of network and computing devices through software-defined
37
- networks and programmable data planes (e.g. eBPF, P4)
38
- - Analysis of the effectiveness of the monitoring-detection-mitigation
39
- pipeline
0 commit comments