@inproceedings{fb437a01e00043caa20cbdaad2c069d0,
title = "Demo: Akatosh: Automated cyber incident verification and impact analysis",
abstract = "Akatosh, a U.S. Department of Homeland Security Transition to Practice Program (TTP) project developed by Oak Ridge National Laboratory with industry and academic partnership, enables automated, real-time forensic analysis of endpoints a.er malwarea .acks and other cyber security incidents by automatically maintaining detailed snapshots of host-level activity on endpoints over time. It achieves this by integrating intrusion detection systems (IDS) with forensic tools. .e combination allows Akatosh to collect vast amounts of endpoint data and assists in verifying, tracking, and analyzing endpoints in real time. .is provides operations personnel and analysts as well as managers and executives with continuous feedback on the impact of malicious so.ware and other security incidents on endpoints in their network.",
keywords = "Breach Remediation, Endpoint Security, Forensic Analysis, Incident Response",
author = "Smith, \{Jared M.\} and Elliot Greenlee and Aaron Ferber",
note = "Publisher Copyright: {\textcopyright} 2017 author(s).; 24th ACM SIGSAC Conference on Computer and Communications Security, CCS 2017 ; Conference date: 30-10-2017 Through 03-11-2017",
year = "2017",
month = oct,
day = "30",
doi = "10.1145/3133956.3138854",
language = "English",
series = "Proceedings of the ACM Conference on Computer and Communications Security",
publisher = "Association for Computing Machinery",
pages = "2463--2465",
booktitle = "CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security",
}