Completed
Detecting altered processes
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
PEIMA - Harnessing Power Laws to Detect Malicious Activities
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Denial of Service attacks
- 3 Internet of Things
- 4 What can we do
- 5 Firewall
- 6 Intrusion Detection System
- 7 Anomaly Based Detection
- 8 What is PEIMA
- 9 Power Laws
- 10 Pareto Distribution
- 11 Zips Law
- 12 Why is this interesting
- 13 DoS attacks
- 14 March of the Red crabs
- 15 Anomaly detection
- 16 Detecting altered processes
- 17 How to use PEIMA
- 18 Example
- 19 Conclusion
- 20 Questions