{PROGRAPHER}: An Anomaly Detection System based on Provenance Graph Embedding

F Yang, J Xu, C Xiong, Z Li, K Zhang - 32nd USENIX Security …, 2023 - usenix.org
In recent years, the Advanced Persistent Threat (APT), which involves complex and
malicious actions over a long period, has become one of the biggest threats against the …

{DISTDET}: A {Cost-Effective} Distributed Cyber Threat Detection System

F Dong, L Wang, X Nie, F Shao, H Wang, D Li… - 32nd USENIX Security …, 2023 - usenix.org
Building provenance graph that considers causal relationships among software behaviors
can better provide contextual information of cyber attacks, especially for advanced attacks …

[PDF][PDF] MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning

Z Jia, Y Xiong, Y Nan, Y Zhang, J Zhao… - arXiv preprint arXiv …, 2023 - usenix.org
Abstract Advance Persistent Threats (APTs), adopted by most delicate attackers, are
becoming increasing common and pose great threat to various enterprises and institutions …

ProvG-Searcher: A Graph Representation Learning Approach for Efficient Provenance Graph Search

E Altinisik, F Deniz, HT Sencar - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
We present ProvG-Searcher, a novel approach for detecting known APT behaviors within
system security logs. Our approach leverages provenance graphs, a comprehensive graph …

Threat detection and investigation with system-level provenance graphs: A survey

Z Li, QA Chen, R Yang, Y Chen, W Ruan - Computers & Security, 2021 - Elsevier
With the development of information technology, the border of the cyberspace gets much
broader and thus also exposes increasingly more vulnerabilities to attackers. Traditional …

Threatrace: Detecting and tracing host-based threats in node level through provenance graph learning

S Wang, Z Wang, T Zhou, H Sun, X Yin… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Host-based threats such as Program Attack, Malware Implantation, and Advanced Persistent
Threats (APT), are commonly adopted by modern attackers. Recent studies propose …

Nodlink: An online system for fine-grained apt attack detection and investigation

S Li, F Dong, X Xiao, H Wang, F Shao, J Chen… - arXiv preprint arXiv …, 2023 - arxiv.org
Advanced Persistent Threats (APT) attacks have plagued modern enterprises, causing
significant financial losses. To counter these attacks, researchers propose techniques that …

Aggregating unsupervised provenance anomaly detectors

G Berrada, J Cheney - 11th International Workshop on Theory and …, 2019 - usenix.org
System-level provenance offers great promise for improving security by facilitating the
detection of attacks. Unsupervised anomaly detection techniques are necessary to defend …

Sometimes, you aren't what you do: Mimicry attacks against provenance graph host intrusion detection systems

A Goyal, X Han, G Wang, A Bates - 30th Network and Distributed System …, 2023 - par.nsf.gov
Reliable methods for host-layer intrusion detection remained an open problem within
computer security. Recent research has recast intrusion detection as a provenance graph …

[PDF][PDF] FLASH: A Comprehensive Approach to Intrusion Detection via Provenance Graph Representation Learning

MU Rehman, H Ahmadi, WU Hassan - 2024 IEEE Symposium on …, 2024 - dartlab.org
Recently, provenance-based Intrusion Detection Systems (IDSes) have gained popularity for
their potential in detecting sophisticated Advanced Persistent Threat (APT) attacks. These …