Are we there yet? an industrial viewpoint on provenance-based endpoint detection and response tools
Provenance-Based Endpoint Detection and Response (P-EDR) systems are deemed crucial
for future Advanced Persistent Threats (APT) defenses. Despite the fact that numerous new …
for future Advanced Persistent Threats (APT) defenses. Despite the fact that numerous new …
Kairos: Practical intrusion detection and investigation using whole-system provenance
Provenance graphs are structured audit logs that describe the history of a system's
execution. Recent studies have explored a variety of techniques to analyze provenance …
execution. Recent studies have explored a variety of techniques to analyze provenance …
A survey on the evolution of fileless attacks and detection techniques
S Liu, G Peng, H Zeng, J Fu - Computers & Security, 2024 - Elsevier
Fileless attacks have gained significant prominence and have become the prevailing type of
attack in recent years. The exceptional level of stealthiness and difficulty in detection …
attack in recent years. The exceptional level of stealthiness and difficulty in detection …
Shadewatcher: Recommendation-guided cyber threat analysis using system audit records
System auditing provides a low-level view into cyber threats by monitoring system entity
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …
Sok: History is a vast early warning system: Auditing the provenance of system intrusions
Auditing, a central pillar of operating system security, has only recently come into its own as
an active area of public research. This resurgent interest is due in large part to the notion of …
an active area of public research. This resurgent interest is due in large part to the notion of …
Depcomm: Graph summarization on system audit logs for attack investigation
Causality analysis generates a dependency graph from system audit logs, which has
emerged as an important solution for attack investigation. In the dependency graph, nodes …
emerged as an important solution for attack investigation. In the dependency graph, nodes …
eAudit: A Fast, Scalable and Deployable Audit Data Collection System*
Today's advanced cyber attack campaigns can often bypass all existing protections. The
primary defense against them is after-the-fact detection, followed by a forensic analysis to …
primary defense against them is after-the-fact detection, followed by a forensic analysis to …
{ALASTOR}: Reconstructing the provenance of serverless intrusions
Serverless computing has freed developers from the burden of managing their own platform
and infrastructure, allowing them to rapidly prototype and deploy applications. Despite its …
and infrastructure, allowing them to rapidly prototype and deploy applications. Despite its …
Hardlog: Practical tamper-proof system auditing using a novel audit device
Audit systems maintain detailed logs of security-related events on enterprise machines to
forensically analyze potential incidents. In principle, these logs should be safely stored in a …
forensically analyze potential incidents. In principle, these logs should be safely stored in a …
On the forensic validity of approximated audit logs
Auditing is an increasingly essential tool for the defense of computing systems, but the
unwieldy nature of log data imposes significant burdens on administrators and analysts. To …
unwieldy nature of log data imposes significant burdens on administrators and analysts. To …