Pagoda: A hybrid approach to enable efficient real-time provenance based intrusion detection in big data environments

Y Xie, D Feng, Y Hu, Y Li, S Sample… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Efficient intrusion detection and analysis of the security landscape in big data environments
present challenge for today's users. Intrusion behavior can be described by provenance …

A dynamic provenance graph-based detector for advanced persistent threats

L Wang, L Fang, Y Hu - Expert Systems with Applications, 2025 - Elsevier
Abstract Advanced Persistent Threats (APTs) pose a major cyber threat due to their stealthy,
long-term nature and intricate complexity, making them particularly challenging to detect …

A behavioral study of advanced security attacks in enterprise networks

MA Kumari, KSN Prasad - 2021 IEEE International Conference …, 2021 - ieeexplore.ieee.org
Securing enterprise networks from cyber attacks has become one of the most paramount
and daunting tasks for any organization or industry in recent times. Traditional cyber-attacks …

XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph

NDH Son, HT Thi, PT Duy, VH Pham - International Conference on …, 2023 - Springer
Advanced persistent threats (APT) are increasingly sophisticated and pose a significant
threat to organizations' cybersecurity. Detecting APT attacks in a timely manner is crucial to …

Analytics for directed contact networks

G Cybenko, S Huntsman - Applied Network Science, 2019 - Springer
Directed contact networks (DCNs) are temporal networks that are useful for analyzing and
modeling phenomena in transportation, communications, epidemiology and social …

A Markov model for inferring flows in directed contact networks

S Huntsman - Complex Networks and Their Applications VII: Volume …, 2019 - Springer
Directed contact networks (DCNs) are a particularly flexible and convenient class of
temporal networks, useful for modeling and analyzing the transfer of discrete quantities in …

A monthly snapshot-based approach for threat hunting within Windows IT environments

M Jacquier - 2021 - diva-portal.org
Abstract/Sammanfattning This work aims at implementing a threat hunting method based on
monthly data snapshots in Windows IT environments, and at assessing whether and how …

[PDF][PDF] Pagoda: A Hybrid Approach to Enable Efficient Real-Time Provenance Based Intrusion

Y Xie, D Feng, Y Hu - IEEE Transactions on Dependable and Secure …, 2020 - academia.edu
Efficient intrusion detection and analysis of the security landscape in big data environments
present challenge for today's users. Intrusion behavior can be described by provenance …