An event-based data model for granular information flow tracking

J Khoury, T Upthegrove, A Caro, B Benyo… - … Workshop on Theory and …, 2020 - usenix.org
We present a common data model for representing causal events across a wide range of
platforms and granularities. The model was developed for attack provenance analysis under …

[HTML][HTML] Missing Data Imputation Based on Causal Inference to Enhance Advanced Persistent Threat Attack Prediction

X Cheng, M Kuang, H Yang - Symmetry, 2024 - mdpi.com
With the continuous development of network security situations, the types of attacks increase
sharply, but can be divided into symmetric attacks and asymmetric attacks. Symmetric …

Implementation of an APT attack detection system through ATT&CK-based attack chain reconstruction

S Cho, Y Park, K Lee - Journal of The Korea Institute of Information …, 2022 - koreascience.kr
In order to effectively detect APT attacks performed by well-organized adversaries, we
implemented a system to detect attacks by reconstructing attack chains of APT attacks. Our …

Heterogeneous Event Causal Dependency Definition for the Detection and Explanation of Multi-Step Attacks

C Xosanavongsa - 2020 - theses.hal.science
Knowing that a persistent attacker will eventually succeed in gaining a foothold inside the
targeted network despite prevention mechanisms, it is mandatory to perform security …

[PDF][PDF] Benchmarking Performance Overhead of DTrace on FreeBSD and eBPF on Linux

M Piotrowski - 2024.asiabsdcon.org
DTrace and eBPF are among the most powerful observability tools available on general-
purpose operating systems today, with which users can ask arbitrary questions and receive …

ATT&CK 기반공격체인구성을통한APT 공격탐지시스템구현

조성영, 박용우, 이경식 - 정보보호학회논문지, 2022 - dbpia.co.kr
본 연구에서는 조직화된 공격 주체가 수행하는 APT 공격을 효과적으로 탐지하기 위하여,
공격체인을 구성하여 공격을 탐지하는 시스템을 구축하였다. 공격체인 기반 APT 공격 탐지 …