Fault management in software-defined networking: A survey

Y Yu, X Li, X Leng, L Song, K Bu… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Software-defined networking (SDN) has emerged as a new network paradigm that promises
control/data plane separation and centralized network control. While these features simplify …

Tactical provenance analysis for endpoint detection and response systems

WU Hassan, A Bates, D Marino - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Endpoint Detection and Response (EDR) tools provide visibility into sophisticated intrusions
by matching system events against known adversarial behaviors. However, current solutions …

[PDF][PDF] You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.

Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee… - NDSS, 2020 - cs.virginia.edu
To subvert recent advances in perimeter and host security, the attacker community has
developed and employed various attack vectors to make a malware much stealthier than …

Fear and logging in the internet of things

Q Wang, WU Hassan, A Bates, C Gunter - Network and Distributed …, 2018 - par.nsf.gov
As the Internet of Things (IoT) continues to proliferate, diagnosing incorrect behavior within
increasingly-automated homes becomes considerably more difficult. Devices and apps may …

A survey on network verification and testing with formal methods: Approaches and challenges

Y Li, X Yin, Z Wang, J Yao, X Shi, J Wu… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Networks have grown increasingly complicated. Violations of intended policies can
compromise network availability and network reliability. Network operators need to ensure …

Practical whole-system provenance capture

T Pasquier, X Han, M Goldstein, T Moyer… - Proceedings of the …, 2017 - dl.acm.org
Data provenance describes how data came to be in its present form. It includes data sources
and the transformations that have been applied to them. Data provenance has many uses …

Towards scalable cluster auditing through grammatical inference over provenance graphs

WU Hassan, L Aguse, N Aguse, A Bates… - Network and Distributed …, 2018 - par.nsf.gov
Investigating the nature of system intrusions in large distributed systems remains a
notoriously difficult challenge. While monitoring tools (eg, Firewalls, IDS) provide preliminary …

Scaling hardware accelerated network monitoring to concurrent and dynamic queries with {* Flow}

J Sonchack, O Michel, AJ Aviv, E Keller… - 2018 USENIX Annual …, 2018 - usenix.org
Measurement plays a key role in network operation and management. An important but
unaddressed practical requirement in high speed networks is supporting concurrent …

Rain: Refinable attack investigation with on-demand inter-process information flow tracking

Y Ji, S Lee, E Downing, W Wang, M Fazzini… - Proceedings of the …, 2017 - dl.acm.org
As modern attacks become more stealthy and persistent, detecting or preventing them at
their early stages becomes virtually impossible. Instead, an attack investigation or …

Improving reproducibility of data science pipelines through transparent provenance capture

L Rupprecht, JC Davis, C Arnold, Y Gur… - Proceedings of the …, 2020 - dl.acm.org
Data science has become prevalent in a large variety of domains. Inherent in its practice is
an exploratory, probing, and fact finding journey, which consists of the assembly, adaptation …