2013
DOI: 10.1007/978-3-642-40203-6_30
|View full text |Cite
|
Sign up to set email alerts
|

Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 14 publications
0
10
0
Order By: Relevance
“…In literature [49], a model called System Object Dependency Graph (SOGD) is proposed to reveal zero-day attack paths. Nodes in SODG represent system objects, such as files, processes and sockets.…”
Section: A System Object Dependency Graph (Sodg)mentioning
confidence: 99%
See 3 more Smart Citations
“…In literature [49], a model called System Object Dependency Graph (SOGD) is proposed to reveal zero-day attack paths. Nodes in SODG represent system objects, such as files, processes and sockets.…”
Section: A System Object Dependency Graph (Sodg)mentioning
confidence: 99%
“…System Object Dependency Graph [49]: If the system call trace for the i − th host is denoted as i , then the SODG for the host is a directed graph G(V i , E i ), where:…”
Section: A System Object Dependency Graph (Sodg)mentioning
confidence: 99%
See 2 more Smart Citations
“…Our work lands on a different cloud environment and takes a reverse strategy by using BN to infer the stealthy bridges, which are unknown in nature. In the future, the inference of stealthy bridges can be further extended to identify the zero-day attack paths in cloud, as in [10] for traditional networks.…”
Section: Related Workmentioning
confidence: 99%