System-Level Data Management for Endpoint Advanced Persistent Threat Detection: Issues, Challenges and Trends

T Chen, C Zheng, T Zhu, C Xiong, J Ying, Q Yuan… - Computers & …, 2023 - Elsevier
Advanced persistent threat (APT) attacks pose significant security threats to governments
and large enterprises. Endpoint detection and response (EDR) methods, which are standard …

A Survey on Advanced Persistent Threat Detection: A Unified Framework, Challenges, and Countermeasures

B Zhang, Y Gao, B Kuang, C Yu, A Fu… - ACM Computing …, 2024 - dl.acm.org
In recent years, frequent Advanced Persistent Threat (APT) attacks have caused disastrous
damage to critical facilities, leading to severe information leakages, economic losses, and …

eAudit: A Fast, Scalable and Deployable Audit Data Collection System*

R Sekar, H Kimm, R Aich - 2024 IEEE Symposium on Security …, 2024 - ieeexplore.ieee.org
Today's advanced cyber attack campaigns can often bypass all existing protections. The
primary defense against them is after-the-fact detection, followed by a forensic analysis to …

TREC: APT tactic/technique recognition via few-shot provenance subgraph learning

M Lv, HZ Gao, X Qiu, T Chen, T Zhu, J Chen… - Proceedings of the 2024 …, 2024 - dl.acm.org
APT (Advanced Persistent Threat) with the characteristics of persistence, stealth, and
diversity is one of the greatest threats against cyber-infrastructure. As a countermeasure …

Paradise: real-time, generalized, and distributed provenance-based intrusion detection

Y Wu, Y Xie, X Liao, P Zhou, D Feng… - … on Dependable and …, 2022 - ieeexplore.ieee.org
Identifying intrusion from massive and multi-source logs accurately and in real-time presents
challenges for today's users. This article presents Paradise, a real-time, generalized, and …

[HTML][HTML] Forensics for multi-stage cyber incidents: Survey and future directions

A Nisioti, G Loukas, A Mylonas, E Panaousis - … Science International: Digital …, 2023 - Elsevier
The increase in the complexity and sophistication of multi-stage cyber attacks, such as
advanced persistent threats, paired with the large volume of data produced by modern …

APTSHIELD: A Stable, Efficient and Real-Time APT Detection System for Linux Hosts

T Zhu, J Yu, C Xiong, W Cheng, Q Yuan… - … on Dependable and …, 2023 - ieeexplore.ieee.org
Advanced Persistent Threat (APT) attacks have caused massive financial loss worldwide.
Researchers thereby have proposed a series of solutions to detect APT attacks, such as …

System auditing for real-time systems

A Bansal, A Kandikuppa, M Hasan, CY Chen… - ACM Transactions on …, 2023 - dl.acm.org
System auditing is an essential tool for detecting malicious events and conducting forensic
analysis. Although used extensively on general-purpose systems, auditing frameworks have …

ProcSAGE: an efficient host threat detection method based on graph representation learning

B Xu, Y Gong, X Geng, Y Li, C Dong, S Liu, Y Liu… - Cybersecurity, 2024 - Springer
Abstract Advanced Persistent Threats (APTs) achieves internal networks penetration
through multiple methods, making it difficult to detect attack clues solely through boundary …

Implementation of risk-aggregated substation testbed using generative adversarial networks

Z Yang, S Zhang, CW Ten, T Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Capturing the anomalies of a cyber system in power control networks would promote
operational awareness. Correlation of such events, eg, intrusion attempts, traffic flow, and …