D3FEND Matrix

← Back to Navigator
Published on D3FEND
Unpublished (Ontology Only)
Category ModelHardenDetectIsolateDeceiveEvictRestore
Application Security D3-ACH Application Configuration Hardening D3-AH Application Hardening D3-ABPI Application-based Process Isolation D3-RS Restore Software
Credential Protection D3-CH Credential Hardening D3-CCSA Credential Compromise Scope Analysis D3-DUC Decoy User Credential D3-CE Credential Eviction
Network Defense D3A-ANNC Artificial Neural Network Classification D3A-CNN Convolutional Neural Network D3A-DNNC Deep Neural Network Classification D3A-GAN Generative Adversarial Network D3A-RNN Recurrent Neural Network D3-ANAA Administrative Network Activity Analysis D3-DNSTA DNS Traffic Analysis D3-IPCTA IPC Traffic Analysis D3-NTA Network Traffic Analysis D3-NTSA Network Traffic Signature Analysis D3-RTA RPC Traffic Analysis D3-NI Network Isolation D3-DNR Decoy Network Resource D3-DNSCE DNS Cache Eviction D3-RNA Restore Network Access
File Security D3-EFA Emulated File Analysis D3-FAPA File Access Pattern Analysis D3-FA File Analysis D3-FCOA File Content Analysis D3-FCA File Creation Analysis D3-FHRA File Hash Reputation Analysis D3-FIM File Integrity Monitoring D3-SFA System File Analysis D3-DF Decoy File D3-FEV File Eviction D3-RF Restore File
Process Protection D3A-LSTM Long Short-term Memory D3A-UP Unsupervised Preprocessing D3-PA Process Analysis D3-PLA Process Lineage Analysis D3-PSMD Process Self-Modification Detection D3-PSA Process Spawn Analysis D3-HBPI Hardware-based Process Isolation D3-KBPI Kernel-based Process Isolation D3-PCSV Process Code Segment Verification D3-PSEP Process Segment Execution Prevention D3-PE Process Eviction D3-PT Process Termination
System Hardening D3-AM Access Modeling D3-ARMA ARMA Model D3-AI Asset Inventory D3A-BA Bootstrap Aggregating D3-BDI Broadcast Domain Isolation D3-DRT Domain Registration Takedown D3-DTP Domain Trust Policy D3-EF Email Filtering D3-ER Email Removal D3-FRDDL Forward Resolution Domain Denylisting
+2 more
D3-IOPR IO Port Restriction D3-MH Message Hardening D3-OPR Operating Mode Restriction D3-PH Platform Hardening D3-OSM Operating System Monitoring D3-SCA System Call Analysis D3-SDM System Daemon Monitoring D3-SICA System Init Config Analysis D3-BDI Broadcast Domain Isolation D3-SAOR Segment Address Offset Randomization D3-CHN Connected Honeynet D3-DE Decoy Environment D3-DO Decoy Object D3-DP Decoy Persona D3-DPR Decoy Public Release D3-DST Decoy Session Token D3-IHN Integrated Honeynet D3-SHN Standalone Honeynet D3-OE Object Eviction D3-RKD Registry Key Deletion D3-ST Session Termination D3-RE Restore Email D3-CNR Content Rebuild D3-RA Restore Access D3-RC Restore Configuration D3-RDI Restore Disk Image D3-RO Restore Object
User Protection D3-DAM Domain Account Monitoring D3-DAM Domain Account Monitoring D3-LAM Local Account Monitoring D3-UBA User Behavior Analysis D3-UDTA User Data Transfer Analysis D3-UGLPA User Geolocation Logon Pattern Analysis D3-USICA User Session Init Config Analysis D3-RUAA Restore User Account Access
Analytics & Detection D3A-AC Actor-Critic D3A-ARTC Adaptive Resonance Theory Clustering D3A-AL Alethic Logic D3A-ABC ANN-based Clustering D3A-ASP Answer Set Programming D3A-ASM Approximate String Matching D3A-AM ARIMA Model D3A-ARL Association Rule Learning D3A-AFTL Asymmetric Feature-based Transfer Learning D3A-AUT Autoencoding
+178 more
D3A-CA Cluster Analysis D3-CIA Container Image Analysis D3A-DBS DBSCAN D3A-DA Discriminant Analysis D3-DNRA Domain Name Reputation Analysis D3A-MA Multivariate Analysis D3A-PCA Principal Component Analysis D3A-RA Regression Analysis D3A-RAL Regression Analysis Learning D3A-TSA Time Series Analysis
+33 more
D3-CIA Container Image Analysis
Execution Control D3-SCH Source Code Hardening D3-EI Execution Isolation
Data Protection D3-RD Restore Database