Provenance-based intrusion detection systems: A survey

M Zipperle, F Gottwalt, E Chang, T Dillon - ACM Computing Surveys, 2022 - dl.acm.org
Traditional Intrusion Detection Systems (IDS) cannot cope with the increasing number and
sophistication of cyberattacks such as Advanced Persistent Threats (APT). Due to their high …

APT beaconing detection: A systematic review

MA Talib, Q Nasir, AB Nassif, T Mokhamed… - Computers & …, 2022 - Elsevier
Abstract Advanced Persistent Threat (APT) is a type of threat that has grabbed the attention
of researchers, particularly in the industrial security field. APTs are cyber intrusions carried …

KAIROS: Practical intrusion detection and investigation using whole-system provenance

Z Cheng, Q Lv, J Liang, Y Wang, D Sun… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Provenance graphs are structured audit logs that describe the history of a system's
execution. Recent studies have explored a variety of techniques to analyze provenance …

APT-KGL: An intelligent APT detection system based on threat knowledge and heterogeneous provenance graph learning

T Chen, C Dong, M Lv, Q Song, H Liu… - … on Dependable and …, 2022 - ieeexplore.ieee.org
APTs (Advanced Persistent Threats) have caused serious security threats worldwide. Most
existing APT detection systems are implemented based on sophisticated forensic analysis …

A systematic literature review and a conceptual framework proposition for advanced persistent threats (APT) detection for mobile devices using artificial intelligence …

AA Al-Kadhimi, MM Singh, MNA Khalid - Applied Sciences, 2023 - mdpi.com
Advanced persistent threat (APT) refers to a specific form of targeted attack used by a well-
organized and skilled adversary to remain undetected while systematically and continuously …

EdgeTorrent: Real-time Temporal Graph Representations for Intrusion Detection

IJ King, X Shu, J Jang, K Eykholt, T Lee… - Proceedings of the 26th …, 2023 - dl.acm.org
Anomaly-based intrusion detection aims to learn the normal behaviors of a system and
detect activity that deviates from it. One of the best ways to represent the behavior of a …

T-trace: Constructing the apts provenance graphs through multiple syslogs correlation

T Li, X Liu, W Qiao, X Zhu, Y Shen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Advanced Persistent Threats (APTs) employ sophisticated and covert tactics to infiltrate
target systems, leading to increased vulnerability and an elevated risk of exposure …

[PDF][PDF] Advanced persistent threats (apt)-attribution-mictic framework extension

PR Brandao - Journal of Computer Science, 2021 - pdfs.semanticscholar.org
Analysis of one of the fundamental parts of the Advanced Persistent Threats (APT) Attacks.
The phases of the APTs, their framing with the identification of criminals. Type of attack that …

[HTML][HTML] Hack me if you can: Aggregating autoencoders for countering persistent access threats within highly imbalanced data

S Benabderrahmane, N Hoang, P Valtchev… - Future Generation …, 2024 - Elsevier
Abstract Advanced Persistent Threats (APTs) are sophisticated, targeted cyberattacks
designed to gain unauthorized access to systems and remain undetected for extended …

APT Attack Detection Based on Graph Convolutional Neural Networks

W Ren, X Song, Y Hong, Y Lei, J Yao, Y Du… - International Journal of …, 2023 - Springer
Advanced persistent threat (APT) attacks are malicious and targeted forms of cyberattacks
that pose significant challenges to the information security of governments and enterprises …