Threat Detection and Investigation with System-level Provenance Graphs: A Survey

作者: Qi Alfred Chen , Yan Chen , Zhenyuan Li , Runqing Yang , Wei Ruan

DOI: 10.1016/J.COSE.2021.102282

关键词: Data collectionInformation technologySystems architectureThreat modelCyberspaceComputer scienceSelection (linguistics)Data managementData scienceSoftware deployment

摘要: With the development of information technology, the border of the cyberspace gets much broader and thus also exposes increasingly more vulnerabilities to attackers. Traditional …

参考文章(80)
Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel, Muttukrishnan Rajarajan, A survey of intrusion detection techniques in Cloud Journal of Network and Computer Applications. ,vol. 36, pp. 42- 57 ,(2013) , 10.1016/J.JNCA.2012.05.003
T Oinn, D Marvin, L Moreau, M Addis, C Goble, J Zhao, P Watson, R Stevens, M Greenwood, Provenance of e-Science Experiments - Experience from Bioinformatics In: Proceedings of the UK e-Science Programme All Hands Conference; {EPSRC}; 2003. p. 223-226.. pp. 223- 226 ,(2003)
Peter Buneman, Sanjeev Khanna, Tan Wang-Chiew, Why and Where: A Characterization of Data Provenance international conference on database theory. pp. 316- 330 ,(2001) , 10.1007/3-540-44503-X_20
Sandeep Bhatkar, R. Sekar, Wei Xu, Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks usenix security symposium. pp. 9- ,(2006)
Robert D. Riepshoff, Kyle M. Delap, Robbie D. Woodrum, Greg A. Wade, Complex event processing engine ,(2010)
Teresa F. Lunt, A survey of intrusion detection techniques Computers & Security. ,vol. 12, pp. 405- 418 ,(1993) , 10.1016/0167-4048(93)90029-5
Juliana Freire, David Koop, Emanuele Santos, Cl Silva, Provenance for Computational Tasks: A Survey computational science and engineering. ,vol. 10, pp. 11- 21 ,(2008) , 10.1109/MCSE.2008.79
Yogesh L. Simmhan, Beth Plale, Dennis Gannon, A survey of data provenance in e-science international conference on management of data. ,vol. 34, pp. 31- 36 ,(2005) , 10.1145/1084805.1084812
Thomas Naughton, Wesley Bland, Geoffroy Vallee, Christian Engelmann, Stephen L. Scott, Fault injection framework for system resilience evaluation Proceedings of the 2009 workshop on Resiliency in high performance - Resilience '09. pp. 23- 28 ,(2009) , 10.1145/1552526.1552530