共 24 条
- [1] MANZOOR E, MILAJERDI S M, AKOGLU L., Fast memory-efficient anomaly detection in streaming heterogeneous graphs, Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1035-1044, (2016)
- [2] HOFER-SCHMITZ K, KLEB U, STOJANOVIC B., The influences of feature sets on the detection of advanced persistent threats, Electronics, 10, 6, (2021)
- [3] BENABDERRAHMANE S, BERRADA G, CHENEY J, Et al., A rule mining-based advanced persistent threats detection system, (2021)
- [4] ANJUM M M, IQBAL S, HAMELIN B., ANUBIS: a provenance graph-based framework for advanced persistent threat detection, Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, pp. 1684-1693, (2022)
- [5] CHENG X, ZHANG J L, TU Y F, Et al., Cyber situation perception for Internet of Things systems based on zero-day attack activities recognition within advanced persistent threat, Concurrency and Computation: Practice and Experience, 34, 16, (2022)
- [6] XIE L X, LI X O, YANG H Y, Et al., A multi-stage detection method for APT attacks based on sample feature enhancement, Journal on Communications, 43, 12, pp. 66-76, (2022)
- [7] KING S T, CHEN P M., Backtracking intrusions, Proceedings of the nineteenth ACM symposium on Operating systems principles, pp. 223-236, (2003)
- [8] HOSSAIN M N, MILAJERDI S M, WANG J N, Et al., Sleuth: real-time attack scenario reconstruction from COTS audit data, Proceedings of the 26th USENIX Conference on Security Symposium, pp. 487-504, (2017)
- [9] MILAJERDI S M, ESHETE B, GJOMEMO R, Et al., Poirot: aligning attack behavior with kernel audit records for cyber threat hunting, Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 1795-1812, (2019)
- [10] DONG C Y, LYU M Q, CHEN T M, Et al., Heterogeneous provenance graph learning model based APT detection, Computer Science, 50, 4, pp. 359-368, (2023)