T-trace: Constructing the apts provenance graphs through multiple syslogs correlation
Advanced Persistent Threats (APTs) employ sophisticated and covert tactics to infiltrate
target systems, leading to increased vulnerability and an elevated risk of exposure …
target systems, leading to increased vulnerability and an elevated risk of exposure …
[HTML][HTML] Hack me if you can: Aggregating autoencoders for countering persistent access threats within highly imbalanced data
S Benabderrahmane, N Hoang, P Valtchev… - Future Generation …, 2024 - Elsevier
Abstract Advanced Persistent Threats (APTs) are sophisticated, targeted cyberattacks
designed to gain unauthorized access to systems and remain undetected for extended …
designed to gain unauthorized access to systems and remain undetected for extended …
基于系统溯源图的威胁发现与取证分析综述
冷涛, 蔡利君, 于爱民, 朱子元, 马建刚, 李超飞… - 通信 …, 2022 - infocomm-journal.com
通过调研溯源图研究相关的文献, 提出了基于系统溯源图的网络威胁发现和取证分析研究框架.
详细综述了基于溯源图的数据采集, 数据管理, 数据查询和可视化方法; 提出了基于规则 …
详细综述了基于溯源图的数据采集, 数据管理, 数据查询和可视化方法; 提出了基于规则 …
A Federated Learning Approach for Multi-stage Threat Analysis in Advanced Persistent Threat Campaigns
F Nelles, A Yazdinejad, A Dehghantanha… - arXiv preprint arXiv …, 2024 - arxiv.org
Multi-stage threats like advanced persistent threats (APT) pose severe risks by stealing data
and destroying infrastructure, with detection being challenging. APTs use novel attack …
and destroying infrastructure, with detection being challenging. APTs use novel attack …
FGC-Stream: a novel joint miner for frequent generators and closed itemsets in data streams
T Martin, P Valtchev, LR Roux - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Mining condensed representations of frequent itemsets (FI), namely frequent closures (FCIs)
or generators (FGIs), over a stream is already a challenging task, and mining both is even …
or generators (FGIs), over a stream is already a challenging task, and mining both is even …
基于溯源图和注意力机制的APT 攻击检测模型构建
李元诚, 罗昊, 王欣煜, 原洁璇 - 通信学报, 2024 - infocomm-journal.com
针对现有攻击检测方法难以应对持续时间长, 攻击手段复杂隐蔽的高级持续威胁的问题,
构建了基于注意力机制和溯源图的APT 攻击检测模型. 首先, 基于系统的审计日志构建能够描述 …
构建了基于注意力机制和溯源图的APT 攻击检测模型. 首先, 基于系统的审计日志构建能够描述 …
Mining frequent generators and closures in data streams with FGC-Stream
T Martin, P Valtchev, LR Roux - Knowledge and Information Systems, 2023 - Springer
Mining frequent itemsets (FIs) from data streams is a challenging task due to the limited
resources available wrt the typically large size of the result and the need for frequent …
resources available wrt the typically large size of the result and the need for frequent …
[PDF][PDF] An APT Attack Detection Method Based on eBPF and Transformer
R Qiu, H Luo, S Jing, X Li, Y Li - isrc.asia.edu.tw
Advanced persistent threats (APTs) are a type of attack that uses advanced techniques to
launch long-term and targeted network attacks against specific entities. APTs can exploit …
launch long-term and targeted network attacks against specific entities. APTs can exploit …