2021
DOI: 10.1109/tifs.2021.3098977
|View full text |Cite
|
Sign up to set email alerts
|

TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(20 citation statements)
references
References 34 publications
0
20
0
Order By: Relevance
“…Irshad et al [13] have proposed TRACE, a provenance tracking system for enterprise-wide APT detection. TRACE offers host-level provenance tracking at the granularity of program executions units and integrates provenance collected from individual hosts to construct distributed enterprise-wide causal graphs.…”
Section: A Apt Detection In Enterprise Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…Irshad et al [13] have proposed TRACE, a provenance tracking system for enterprise-wide APT detection. TRACE offers host-level provenance tracking at the granularity of program executions units and integrates provenance collected from individual hosts to construct distributed enterprise-wide causal graphs.…”
Section: A Apt Detection In Enterprise Networkmentioning
confidence: 99%
“…• While [10], [11], [13] have been designed using audit logs-based provenance and [14] has been designed using enterprise logs, [12] has been designed using network IDS alerts. Since each of these works is based on a single data source, they are unable to leverage the information provided by other data sources.…”
Section: A Apt Detection In Enterprise Networkmentioning
confidence: 99%
“…For those interested in more details about the commonly used datasets, refer to Nisioti et al (2018) and Ring et al (2019). Irshad et al (2021) used a host monitoring component to collect forensic artifacts at runtime, which was evaluated with five attack engagements conducted experimentally. The artifacts were collected from two perspectives, namely system calls and unit-based selective instrumentation (UBSI).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Compared to the network traffic that cannot fully reflect the semantics of the behavior, kernel-level events are more traceable and immune to encryption. Therefore, many researchers use kernel-level events for cyber security, such as [1,2,3,4,5,6].…”
Section: Introductionmentioning
confidence: 99%