… In this section, we first give several threatmodels (Section 6.1) commonly used in threat detection research using provenance graphs. Then we give a comparison of the existing …
… We discuss the existing threatprovenance studies and the associated mechanisms for tracing threats, … systems exhibited is assuring security under relaxed threatmodels, often implicitly …
S Wang, Z Wang, T Zhou, H Sun, X Yin… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
… We introduce the threatmodel in §IV. An overall description of THREATRACE is presented in §V. We introduce the experiments in §VI and discuss some issues and limitations in §VII. …
… In Section 2 we present in detail the threatmodel. Then, in Section 3 we introduce our provenance defense to identify poisonous data when a partially trusted data set is available. In …
… This work describes our progress in defining a threatmodel and proposing security controls for provenance systems in the context of e-Science. We identify the assurance of correct …
MM Anjum, S Iqbal, B Hamelin - Proceedings of the 37th ACM/SIGAPP …, 2022 - dl.acm.org
… in-memory provenance graph analysis as it runs. Prior research that used provenance graphs for … for detecting APTs from provenance graph data and explaining the predictions to cyber-…
… that effectively leverages data provenance analysis. From modeling to detection, UNICORN … Through extensive yet time-efficient graph analysis, UNICORN explores provenance graphs …
M Kapoor, J Melton, M Ridenhour… - 2021 20th IEEE …, 2021 - ieeexplore.ieee.org
… We model the data using the W3C provenance labels for nodes and relations [20]. W3C PROV defines three node types: agent, entity, and activity. Additionally, there are relations …
… data provenance to commercial EDR tools. We introduce the notion of Tactical Provenance … about causal dependencies between EDR-generated threat alerts. TPGs provide compact …