Review of threat discovery and forensic analysis based on system provenance graph
By investigating works of literature related to provenance graph research, a research framework for network threat discovery and forensic analysis based on system-level provenance graph was proposed.A detailed overview of data collection, data management, data query, and visualization methods based...
Saved in:
Main Authors: | Tao LENG, Lijun CAI, Aimin YU, Ziyuan ZHU, Jian’gang MA, Chaofei LI, Ruicheng NIU, Dan MENG |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2022-07-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022105/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
APT attack threat-hunting network model based on hypergraph Transformer
by: Yuancheng LI, et al.
Published: (2024-02-01) -
Research on the Defense of Advanced Persistent Threats in Enterprise Network
by: Dongxin Liu, et al.
Published: (2013-12-01) -
SmartProvenance: User‐friendly provenance system for internet of things applications based on event flow graphs
by: Byeong‐Mo Chang, et al.
Published: (2022-12-01) -
Construction of advanced persistent threat attack detection model based on provenance graph and attention mechanism
by: Yuancheng LI, et al.
Published: (2024-03-01) -
APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System
by: Safdar Hussain Javed, et al.
Published: (2023-01-01)