VICKY-ZZ / APT-ProvenanceGraph

该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

APT-ProvenanceGraph

该资源是各种溯源图相关的论文和资源总结,根目录为作者分享文章的PPT。涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~

推荐作者博客

目录


学术界

Provenance Graph

【2016-2018】

Shiqing Ma, et al. ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting. NDSS 2016

Md Nahid Hossain, et al. SLEUTH Real-time Attack Scenario Reconstruction from COTS Audit Data. USENIX Sec 2017

Yushan Liu, et al. Towards a Timely Causality Analysis for Enterprise Security. PrioTracker, NDSS 2018

Wajih Ul Hassan, et al. Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs. NDSS 2018

Yang Ji, et al. Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking. USENIX Sec 2018

Thomas F. J.-M. Pasquier, et al. Runtime Analysis of Whole-System Provenance. CCS 2018


【2019】

Sadegh M. Milajerdi, et al. Poirot: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting. CCS 2019

Sadegh M. Milajerdi, et al. HOLMES: Real-Time APT Detection through Correlation of Suspicious Information Flows. IEEE S&P 2019

Wajih Ul Hassan, et al. NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage. NDSS 2019


【2020】

Wajih Ul Hassan, et al. Tactical Provenance Analysis for Endpoint Detection and Response Systems. RapSheet. IEEE S&P 2020

Xueyuan Han, et al. Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats. NDSS 2020

  • Paper: https://arxiv.org/pdf/2001.01525.pdf
  • Contribution:
  • Institution:Harvard University, University of Bristol, University of Illinois at Urbana-Champaign, University of British Columbia

Qi Wang, et al. You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis. NDSS 2020

Riccardo Paccagnella, et al. Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks. CCS 2020

Wajih Ul Hassan, et al. OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis. NDSS 2020


【2021】

Abdulellah Alsaheel, et al. ATLAS: A Sequence-based Learning Approach for Attack Investigation. USENIX Sec 2021

Carter Yagemann, et al. Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks. CCS 2021

Xutong Chen, et al. CLARION: Sound and Clear Provenance Tracking for Microservice Deployments. USENIX Sec 2021

Le Yu, et al. ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation. NDSS 2021

Kiavash Satvat, et al. EXTRACTOR: Extracting Attack Behavior from Threat Reports. EuroS&P 2021

Zhenyuan Li, et al. Threat detection and investigation with system-level provenance graphs: A survey. C&S 2021



Knowledge Graph

Jun Zhao, et al. Cyber Threat Intelligence Modeling Based on Heterogeneous Graph Convolutional Network. RAID 2020

Yali Gao, et al. HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based on Heterogeneous Information Network. IEEE TKDE 2020


企业界


By:Eastmount 2022-04-02

About

该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~