2022
DOI: 10.23919/jcc.2022.00.028
|View full text |Cite
|
Sign up to set email alerts
|

TDLens: Toward an empirical evaluation of provenance graph-based approach to cyber threat detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Such limitations need to be addressed for a concrete ransomware early detection solution. To overcome the issues related to the length of the API calls and representation of call arguments, system provenance is gaining popularity as it utilizes graphs to present and maintain a history of system events and then leverages the characteristics of the graph to conduct threat detection and attack investigation [168]. Researchers believe that system provenance has the potential to improve the accuracy of malware and intrusion detection [63]; however, the system provenance is out of the scope of this thesis as we will utilize sequential representation for its simplicity and ease of processing.…”
Section: Problem Statementmentioning
confidence: 99%
See 2 more Smart Citations
“…Such limitations need to be addressed for a concrete ransomware early detection solution. To overcome the issues related to the length of the API calls and representation of call arguments, system provenance is gaining popularity as it utilizes graphs to present and maintain a history of system events and then leverages the characteristics of the graph to conduct threat detection and attack investigation [168]. Researchers believe that system provenance has the potential to improve the accuracy of malware and intrusion detection [63]; however, the system provenance is out of the scope of this thesis as we will utilize sequential representation for its simplicity and ease of processing.…”
Section: Problem Statementmentioning
confidence: 99%
“…Recently, many research works on intrusion and threat detection have adopted system provenance-based algorithms considering its potential in this domain [262,258,168,170,254]. The threat detection in these studies generally involves creating a provenance graph of the system's history via tagging and tracking of system events and then utilizing graph characteristics for the task [168]. Figure 2.7 presents a sample of the system provenance graph.…”
Section: Researchers Believe That System Provenance Has the Potentialmentioning
confidence: 99%
See 1 more Smart Citation