High Fidelity Data Reduction for Big Data Security Dependency Analyses

作者: Zhang Xu , Zhenyu Wu , Zhichun Li , Kangkook Jee , Junghwan Rhee

DOI: 10.1145/2976749.2978378

关键词: Dependency (UML)Reduction (complexity)Computer securityDomain knowledgeInformation technology auditComputer scienceForensic scienceIntrusion detection systemAuditAdvanced persistent threatExploit

摘要: Intrusive multi-step attacks, such as Advanced Persistent Threat (APT) attacks, have plagued enterprises with significant financial losses and are the top reason for enterprises to …

参考文章(28)
Dominic G. Lucchetti, Peter M. Chen, Zhuoqing Morley Mao, Samuel T. King, Enriching Intrusion Alerts Through Multi-Host Causality. network and distributed system security symposium. ,(2005)
Siyao Cheng, Jianzhong Li, Lei Yu, Qianqian Ren, Bernoulli sampling based (ε, δ)-approximate aggregation in large-scale sensor networks international conference on computer communications. pp. 1181- 1189 ,(2010)
M. H. Zibaeenejad, J. G. Thistle, Dependency graph: An algorithm for analysis of generalized parameterized networks advances in computing and communications. pp. 696- 702 ,(2015) , 10.1109/ACC.2015.7170816
Graham Cormode, Ke Yi, Tracking Distributed Aggregates over Time-Based Sliding Windows Lecture Notes in Computer Science. pp. 416- 430 ,(2012) , 10.1007/978-3-642-31235-9_28
Nirnay Ghosh, Ishan Chokshi, Mithun Sarkar, Soumya K. Ghosh, Anil Kumar Kaushik, Sajal K. Das, NetSecuritas: An Integrated Attack Graph-based Security Assessment Tool for Enterprise Networks international conference of distributed computing and networking. pp. 30- ,(2015) , 10.1145/2684464.2684494
Josna Jose, S Manoj Kumar, Joyce Jose, None, Energy efficient recoverable concealed data aggregation in wireless sensor networks ieee international conference on emerging trends in computing communication and nanotechnology. pp. 322- 329 ,(2013) , 10.1109/ICE-CCN.2013.6528517
Xi Xu, Rashid Ansari, Ashfaq Khokhar, Athanasios V. Vasilakos, Hierarchical Data Aggregation Using Compressive Sensing (HDACS) in WSNs ACM Transactions on Sensor Networks. ,vol. 11, pp. 45- ,(2015) , 10.1145/2700264
Jun Liu, Cheng Fang, Nirwan Ansari, Identifying user clicks based on dependency graph wireless and optical communications conference. pp. 1- 5 ,(2014) , 10.1109/WOCC.2014.6839915
Jude Angelo Ambrose, Jorgen Peddersen, Sri Parameswaran, Alvin Labios, Yusuke Yachide, SDG2KPN: System Dependency Graph to function-level KPN generation of legacy code for MPSoCs asia and south pacific design automation conference. pp. 267- 273 ,(2014) , 10.1109/ASPDAC.2014.6742901
Sören Bleikertz, Carsten Vogel, Thomas Groß, Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructures annual computer security applications conference. pp. 26- 35 ,(2014) , 10.1145/2664243.2664274