Fault management in software-defined networking: A survey
Software-defined networking (SDN) has emerged as a new network paradigm that promises
control/data plane separation and centralized network control. While these features simplify …
control/data plane separation and centralized network control. While these features simplify …
Tactical provenance analysis for endpoint detection and response systems
Endpoint Detection and Response (EDR) tools provide visibility into sophisticated intrusions
by matching system events against known adversarial behaviors. However, current solutions …
by matching system events against known adversarial behaviors. However, current solutions …
[PDF][PDF] You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
To subvert recent advances in perimeter and host security, the attacker community has
developed and employed various attack vectors to make a malware much stealthier than …
developed and employed various attack vectors to make a malware much stealthier than …
Fear and logging in the internet of things
As the Internet of Things (IoT) continues to proliferate, diagnosing incorrect behavior within
increasingly-automated homes becomes considerably more difficult. Devices and apps may …
increasingly-automated homes becomes considerably more difficult. Devices and apps may …
A survey on network verification and testing with formal methods: Approaches and challenges
Networks have grown increasingly complicated. Violations of intended policies can
compromise network availability and network reliability. Network operators need to ensure …
compromise network availability and network reliability. Network operators need to ensure …
Practical whole-system provenance capture
Data provenance describes how data came to be in its present form. It includes data sources
and the transformations that have been applied to them. Data provenance has many uses …
and the transformations that have been applied to them. Data provenance has many uses …
Towards scalable cluster auditing through grammatical inference over provenance graphs
Investigating the nature of system intrusions in large distributed systems remains a
notoriously difficult challenge. While monitoring tools (eg, Firewalls, IDS) provide preliminary …
notoriously difficult challenge. While monitoring tools (eg, Firewalls, IDS) provide preliminary …
Scaling hardware accelerated network monitoring to concurrent and dynamic queries with {* Flow}
Measurement plays a key role in network operation and management. An important but
unaddressed practical requirement in high speed networks is supporting concurrent …
unaddressed practical requirement in high speed networks is supporting concurrent …
Rain: Refinable attack investigation with on-demand inter-process information flow tracking
As modern attacks become more stealthy and persistent, detecting or preventing them at
their early stages becomes virtually impossible. Instead, an attack investigation or …
their early stages becomes virtually impossible. Instead, an attack investigation or …
Improving reproducibility of data science pipelines through transparent provenance capture
Data science has become prevalent in a large variety of domains. Inherent in its practice is
an exploratory, probing, and fact finding journey, which consists of the assembly, adaptation …
an exploratory, probing, and fact finding journey, which consists of the assembly, adaptation …