Tactical Provenance Analysis for Endpoint Detection and Response Systems
暂无分享,去创建一个
[1] V. N. Venkatakrishnan,et al. HOLMES: Real-Time APT Detection through Correlation of Suspicious Information Flows , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[2] Andreas Haeberlen,et al. Diagnosing missing events in distributed systems with negative provenance , 2014, SIGCOMM.
[3] Somesh Jha,et al. MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation , 2018, NDSS.
[4] Sokratis K. Katsikas,et al. Using a Fuzzy Inference System to Reduce False Positives in Intrusion Detection , 2009, 2009 16th International Conference on Systems, Signals and Image Processing.
[5] Andreas Haeberlen,et al. Distributed Time-aware Provenance , 2012, Proc. VLDB Endow..
[6] Andreas Haeberlen,et al. Secure network provenance , 2011, SOSP.
[7] Xiangyu Zhang,et al. Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows , 2015, ACSAC.
[8] Xiangyu Zhang,et al. LogGC: garbage collecting audit log , 2013, CCS.
[9] Gianluca Stringhini,et al. ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks , 2019, USENIX Security Symposium.
[10] Thomas Moyer,et al. Transparent Web Service Auditing via Network Provenance Functions , 2017, WWW.
[11] V. N. Venkatakrishnan,et al. SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data , 2018, USENIX Security Symposium.
[12] Alfonso Valdes,et al. Probabilistic Alert Correlation , 2001, Recent Advances in Intrusion Detection.
[13] Wei Wang,et al. A Graph Based Approach Toward Network Forensics Analysis , 2008, TSEC.
[14] Yang Wu,et al. Zeno: Diagnosing Performance Problems with Temporal Provenance , 2019, NSDI.
[15] Fei Wang,et al. MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning , 2017, USENIX Security Symposium.
[16] Mohammad A. Noureddine,et al. OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis , 2020, NDSS.
[17] Margo Seltzer,et al. UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats , 2020, NDSS.
[18] Xiangyu Zhang,et al. ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting , 2016, NDSS.
[19] Fengyuan Xu,et al. High Fidelity Data Reduction for Big Data Security Dependency Analyses , 2016, CCS.
[20] Thomas Moyer,et al. Trustworthy Whole-System Provenance for the Linux Kernel , 2015, USENIX Security Symposium.
[21] Wajih Ul Hassan,et al. Can Data Provenance Put an End to the Data Breach? , 2019, IEEE Security & Privacy.
[22] Fei Wang,et al. HERCULE: attack story reconstruction via community discovery on correlated log graph , 2016, ACSAC.
[23] Mu Zhang,et al. NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis , 2018, CCS.
[24] Hyeontaek Lim,et al. MICA: A Holistic Approach to Fast In-Memory Key-Value Storage , 2014, NSDI.
[25] Xiao Yu,et al. You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis , 2020, NDSS.
[26] Leslie Lamport,et al. Time, clocks, and the ordering of events in a distributed system , 1978, CACM.
[27] Eric Michael Hutchins,et al. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains , 2010 .
[28] V. N. Venkatakrishnan,et al. POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting , 2019, CCS.
[29] Thomas Moyer,et al. Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs , 2018, NDSS.
[30] Andreas Haeberlen,et al. Let SDN Be Your Eyes: Secure Forensics in Data Center Networks , 2014 .
[31] Andreas Haeberlen,et al. The Good, the Bad, and the Differences: Better Network Diagnostics with Differential Provenance , 2016, SIGCOMM.
[32] Wajih Ul Hassan,et al. Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution , 2020, NDSS.
[33] Xiaozhou Li,et al. Efficient querying and maintenance of network provenance at internet-scale , 2010, SIGMOD Conference.
[34] Samuel T. King,et al. Backtracking intrusions , 2003, SOSP '03.
[35] R. Sekar,et al. Dependence-Preserving Data Compaction for Scalable Forensic Analysis , 2018, USENIX Security Symposium.
[36] David M. Eyers,et al. Runtime Analysis of Whole-System Provenance , 2018, CCS.
[37] Somesh Jha,et al. Kernel-Supported Cost-Effective Audit Logging for Causality Tracking , 2018, USENIX Annual Technical Conference.
[38] Hervé Debar,et al. Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.
[39] Xiangyu Zhang,et al. High Accuracy Attack Provenance via Binary-based Execution Partition , 2013, NDSS.
[40] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[41] Mu Zhang,et al. Towards a Timely Causality Analysis for Enterprise Security , 2018, NDSS.
[42] Ding Li,et al. NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage , 2019, NDSS.
[43] Common Attack Pattern Enumeration and Classification — CAPEC TM A Community Knowledge Resource for Building Secure Software , 2013 .