2022
DOI: 10.1109/tifs.2022.3208815
|View full text |Cite
|
Sign up to set email alerts
|

THREATRACE: Detecting and Tracing Host-Based Threats in Node Level Through Provenance Graph Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(12 citation statements)
references
References 29 publications
0
12
0
Order By: Relevance
“…Another group of work proposed clustering and learning-based techniques to distinguish between benign and anomalous patterns in the provenance graph. These works applied several intuitions to graph analysis such as the use of graph sketching techniques [21,51], graph embedding techniques [41,73], knowledge graph embedding techniques [84,85], and sequence-based neural embedding methods [1,43,71].…”
Section: Ablation Studymentioning
confidence: 99%
See 1 more Smart Citation
“…Another group of work proposed clustering and learning-based techniques to distinguish between benign and anomalous patterns in the provenance graph. These works applied several intuitions to graph analysis such as the use of graph sketching techniques [21,51], graph embedding techniques [41,73], knowledge graph embedding techniques [84,85], and sequence-based neural embedding methods [1,43,71].…”
Section: Ablation Studymentioning
confidence: 99%
“…Second, they enable the application of advanced graph algorithms in audit log analysis. Consequently, provenance graph analysis has been extensively employed in the detection of anomalous system activities [14,21,41,43,51,71,73,85]; root-cause analysis and forensic tracking [15,25,29,34,45]; attack story generation [1,27,28,58]; and supporting alert validation and investigation [23,24,54,77].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, many research works on intrusion and threat detection have adopted system provenance-based algorithms considering its potential in this domain [262,258,168,170,254]. The threat detection in these studies generally involves creating a provenance graph of the system's history via tagging and tracking of system events and then utilizing graph characteristics for the task [168].…”
Section: Researchers Believe That System Provenance Has the Potentialmentioning
confidence: 99%
“…Wang et al [254] proposed ThreaTrace, a real-time system to detect host-based threats at the system entity level, leveraging provenance and neural networks, i.e., GraphSAGE. Abbas et al [1] proposed an automated method to detect crossnamespace attacks using provenance graphs modeling crossnamespace events, i.e., the interaction between two containers or a container and the host.…”
Section: Researchers Believe That System Provenance Has the Potentialmentioning
confidence: 99%
“…In our work, we used the GNN that consists of GraphSage GNN [73] for node embedding, following the Softmax function for node classification into malicious and benign activity. Additionally, we considered the ThreaTrace approach [171] that leverages GraphSage architecture to learn node embeddings and use them in supervised settings to train multiple submodels to predict the labels of nodes in the provenance graph. The training happens on benign data.…”
Section: Chapter 5 Feasible Evasion Attacks In Constrained Environmentsmentioning
confidence: 99%