T-trace: Constructing the apts provenance graphs through multiple syslogs correlation

T Li, X Liu, W Qiao, X Zhu, Y Shen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Advanced Persistent Threats (APTs) employ sophisticated and covert tactics to infiltrate
target systems, leading to increased vulnerability and an elevated risk of exposure …

[HTML][HTML] Hack me if you can: Aggregating autoencoders for countering persistent access threats within highly imbalanced data

S Benabderrahmane, N Hoang, P Valtchev… - Future Generation …, 2024 - Elsevier
Abstract Advanced Persistent Threats (APTs) are sophisticated, targeted cyberattacks
designed to gain unauthorized access to systems and remain undetected for extended …

基于系统溯源图的威胁发现与取证分析综述

冷涛, 蔡利君, 于爱民, 朱子元, 马建刚, 李超飞… - 通信 …, 2022 - infocomm-journal.com
通过调研溯源图研究相关的文献, 提出了基于系统溯源图的网络威胁发现和取证分析研究框架.
详细综述了基于溯源图的数据采集, 数据管理, 数据查询和可视化方法; 提出了基于规则 …

A Federated Learning Approach for Multi-stage Threat Analysis in Advanced Persistent Threat Campaigns

F Nelles, A Yazdinejad, A Dehghantanha… - arXiv preprint arXiv …, 2024 - arxiv.org
Multi-stage threats like advanced persistent threats (APT) pose severe risks by stealing data
and destroying infrastructure, with detection being challenging. APTs use novel attack …

FGC-Stream: a novel joint miner for frequent generators and closed itemsets in data streams

T Martin, P Valtchev, LR Roux - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Mining condensed representations of frequent itemsets (FI), namely frequent closures (FCIs)
or generators (FGIs), over a stream is already a challenging task, and mining both is even …

基于溯源图和注意力机制的APT 攻击检测模型构建

李元诚, 罗昊, 王欣煜, 原洁璇 - 通信学报, 2024 - infocomm-journal.com
针对现有攻击检测方法难以应对持续时间长, 攻击手段复杂隐蔽的高级持续威胁的问题,
构建了基于注意力机制和溯源图的APT 攻击检测模型. 首先, 基于系统的审计日志构建能够描述 …

Mining frequent generators and closures in data streams with FGC-Stream

T Martin, P Valtchev, LR Roux - Knowledge and Information Systems, 2023 - Springer
Mining frequent itemsets (FIs) from data streams is a challenging task due to the limited
resources available wrt the typically large size of the result and the need for frequent …

[PDF][PDF] An APT Attack Detection Method Based on eBPF and Transformer

R Qiu, H Luo, S Jing, X Li, Y Li - isrc.asia.edu.tw
Advanced persistent threats (APTs) are a type of attack that uses advanced techniques to
launch long-term and targeted network attacks against specific entities. APTs can exploit …