Provenance-based intrusion detection systems: A survey

M Zipperle, F Gottwalt, E Chang, T Dillon - ACM Computing Surveys, 2022 - dl.acm.org
Traditional Intrusion Detection Systems (IDS) cannot cope with the increasing number and
sophistication of cyberattacks such as Advanced Persistent Threats (APT). Due to their high …

A comprehensive survey on computer forensics: State-of-the-art, tools, techniques, challenges, and future directions

AR Javed, W Ahmed, M Alazab, Z Jalil, K Kifayat… - IEEE …, 2022 - ieeexplore.ieee.org
With the alarmingly increasing rate of cybercrimes worldwide, there is a dire need to combat
cybercrimes timely and effectively. Cyberattacks on computing machines leave certain …

[PDF][PDF] WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics.

J Zeng, ZL Chua, Y Chen, K Ji, Z Liang, J Mao - NDSS, 2021 - mimicji.github.io
Endpoint monitoring solutions are widely deployed in today's enterprise environments to
support advanced attack detection and investigation. These monitors continuously record …

{SEAL}: Storage-efficient causality analysis on enterprise logs with query-friendly compression

P Fei, Z Li, Z Wang, X Yu, D Li, K Jee - 30th USENIX security symposium …, 2021 - usenix.org
Causality analysis automates attack forensic and facilitates behavioral detection by
associating causally related but temporally distant system events. Despite its proven …

A survey on forensics and compliance auditing for critical infrastructure protection

J Henriques, F Caldeira, T Cruz, P Simões - IEEE Access, 2024 - ieeexplore.ieee.org
The broadening dependency and reliance that modern societies have on essential services
provided by Critical Infrastructures is increasing the relevance of their trustworthiness …

A literature review and existing challenges on software logging practices: From the creation to the analysis of software logs

MA Batoun, M Sayagh, R Aghili, A Ouni, H Li - Empirical Software …, 2024 - Springer
Software logging is the practice of recording different events and activities that occur within a
software system, which are useful for different activities such as failure prediction and …

Accountability as a service for robotics: Performance assessment of different accountability strategies for autonomous robots

L Fernández-Becerra… - Logic Journal of the …, 2024 - academic.oup.com
An essential requirement for increasing human confidence in computer systems is knowing
an event's origin. Therefore, it is necessary to have an efficient method to record such …

PDCleaner: A multi-view collaborative data compression method for provenance graph-based APT detection systems

J **, T Zhu, Q Yuan, T Chen, M Lv, C Zheng, JP Mei… - Computers & …, 2025 - Elsevier
In recent years, advanced persistent threats (APTs) have frequently occurred with increasing
severity on a global scale. Provenance graph-based APT detection systems have …

[HTML][HTML] PARGMF: A provenance-enabled automated rule generation and matching framework with multi-level attack description model

M Zipperle, Y Zhang, E Chang, T Dillon - Journal of Information Security …, 2024 - Elsevier
With the rapidly increasing volume of cyber-attacks over the past years due to the new
working-from-home paradigm, protecting hosts, networks, and individuals from cyber threats …

SR2APT: A detection and strategic alert response model against multistage APT attacks

F Shen, L Perigo, JH Curry - Security and Communication …, 2023 - Wiley Online Library
Advanced persistent threats are an emerging cyber threat to cyber‐physical systems (CPS),
especially those comprising mission‐critical physical assets. However, defense against such …