Hercule: Attack story reconstruction via community discovery on correlated log graph

K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang… - Proceedings of the …, 2016 - dl.acm.org
Advanced cyber attacks consist of multiple stages aimed at being stealthy and elusive. Such
attack patterns leave their footprints spatio-temporally dispersed across many different logs …

[PDF][PDF] HERCULE: Attack Story Reconstruction via Community Discovery on Correlated Log Graph

K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang, Z Zhang… - friends.cs.purdue.edu
Advanced cyber attacks consist of multiple stages aimed at being stealthy and elusive. Such
attack patterns leave their footprints spatio-temporally dispersed across many different logs …

[PDF][PDF] HERCULE: Attack Story Reconstruction via Community Discovery on Correlated Log Graph

K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang, Z Zhang… - cyfi.ece.gatech.edu
Advanced cyber attacks consist of multiple stages aimed at being stealthy and elusive. Such
attack patterns leave their footprints spatio-temporally dispersed across many different logs …

HERCULE: Attack story reconstruction via community discovery on correlated log graph

K Pei, Z Gu, B Saltaformaggio, S Ma… - 32nd Annual …, 2016 - researchwithrutgers.com
Advanced cyber attacks consist of multiple stages aimed at being stealthy and elusive. Such
attack patterns leave their footprints spatio-temporally dispersed across many different logs …

HERCULE: Attack story reconstruction via community discovery on correlated log graph

K Pei, Z Gu, B Saltaformaggio, S Ma… - Annual Computer …, 2016 - research.ibm.com
Advanced cyber attacks consist of multiple stages aimed at being stealthy and elusive. Such
attack patterns leave their footprints spatio-temporally dispersed across many different logs …

[PDF][PDF] HERCULE: attack story reconstruction via community discovery on correlated log graph

K Pei, Z Gu, B Saltaformaggio - scholarship.libraries.rutgers.edu
Advanced cyber attacks consist of multiple stages aimed at being stealthy and elusive. Such
attack patterns leave their footprints spatio-temporally dispersed across many different logs …

[PDF][PDF] HERCULE: Attack Story Reconstruction via Community Discovery on Correlated Log Graph

K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang, Z Zhang… - gzs715.github.io
Advanced cyber attacks consist of multiple stages aimed at being stealthy and elusive. Such
attack patterns leave their footprints spatio-temporally dispersed across many different logs …

[PDF][PDF] HERCULE: Attack Story Reconstruction via Community Discovery on Correlated Log Graph

K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang, Z Zhang… - cs.purdue.edu
Advanced cyber attacks consist of multiple stages aimed at being stealthy and elusive. Such
attack patterns leave their footprints spatio-temporally dispersed across many different logs …

[PDF][PDF] HERCULE: Attack Story Reconstruction via Community Discovery on Correlated Log Graph

K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang, Z Zhang… - saltaformaggio.ece.gatech.edu
Advanced cyber attacks consist of multiple stages aimed at being stealthy and elusive. Such
attack patterns leave their footprints spatio-temporally dispersed across many different logs …

[PDF][PDF] HERCULE: Attack Story Reconstruction via Community Discovery on Correlated Log Graph

K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang, Z Zhang… - people.cs.umass.edu
Advanced cyber attacks consist of multiple stages aimed at being stealthy and elusive. Such
attack patterns leave their footprints spatio-temporally dispersed across many different logs …