CrptAC: Find the Attack Chain with Multiple Encrypted System Logs

Clandestine assailants infiltrate intelligent systems in smart cities and homes for different purposes. These attacks leave clues behind in multiple logs. Systems usually upload their local syslogs as encrypted files to the cloud for longterm storage and resource saving. Therefore, the identificatio...

Full description

Bibliographic Details
Main Authors: Weiguo Lin, Jianfeng Ma, Teng Li, Haoyu Ye, Jiawei Zhang, Yongcai Xiao
Format: Article
Language:English
Published: MDPI AG 2024-04-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/13/7/1378