Provenance-based intrusion detection systems: A survey

M Zipperle, F Gottwalt, E Chang, T Dillon - ACM Computing Surveys, 2022 - dl.acm.org
Traditional Intrusion Detection Systems (IDS) cannot cope with the increasing number and
sophistication of cyberattacks such as Advanced Persistent Threats (APT). Due to their high …

Provenance-based intrusion detection: opportunities and challenges

X Han, T Pasquier, M Seltzer - 10th USENIX Workshop on the Theory …, 2018 - usenix.org
Intrusion detection is an arms race; attackers evade intrusion detection systems by
develo** new attack vectors to sidestep known defense mechanisms. Provenance …

Pagoda: A hybrid approach to enable efficient real-time provenance based intrusion detection in big data environments

Y **e, D Feng, Y Hu, Y Li, S Sample… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Efficient intrusion detection and analysis of the security landscape in big data environments
present challenge for today's users. Intrusion behavior can be described by provenance …

P-gaussian: provenance-based gaussian distribution for detecting intrusion behavior variants using high efficient and real time memory databases

Y **e, Y Wu, D Feng, D Long - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
It is increasingly important and a big challenge to detect intrusion behavior variants in
today's world. Previous host-based intrusion detection methods typically explore the …

Angus: efficient active learning strategies for provenance based intrusion detection

L Wu, Y **e, J Li, D Feng, J Liang, Y Wu - Cybersecurity, 2025 - Springer
As modern attack methods become more concealed and complex, obtaining many labeled
samples in big data streams is difficult. Active learning has long been used to achieve better …

Observed vs. Possible Provenance (Research Track)

T Blount, A Chapman, M Johnson… - … International Workshop on …, 2021 - usenix.org
Provenance has been of interest to the Computer Science community for nearly two
decades, with proposed uses ranging from data authentication, to security auditing, to …

ProProv: A Language and Graphical Tool for Specifying Data Provenance Policies

K Dennis, S Engram, T Kaczmarek… - 2022 IEEE 4th …, 2022 - ieeexplore.ieee.org
The Function-as-a-Service cloud computing paradigm has made large-scale application
development convenient and efficient as developers no longer need to deploy or manage …

Specification, Enforcement, and Measurement of Integrity Policies

K Dennis - 2024 - search.proquest.com
The first step to improving an organization's security posture is to define the organization's
security goals. At a technical level, these goals are expressed as security policies. Security …

A dependently typed programming language with dynamic equality

M Lemay - 2022 - search.proquest.com
BOSTON UNIVERSITY GRADUATE SCHOOL OF ARTS AND SCIENCES Dissertation A
DEPENDENTLY TYPED PROGRAMMING LANGUAGE WITH DYNAMIC EQUALI Page 1 …

Proactive Provenance Policies for Automatic Cryptographic Data Centric Security

S Engram, T Kaczmarek, A Lee, D Bigelow - Provenance and Annotation of …, 2021 - Springer
Data provenance analysis has been used as an assistive measure for ensuring system
integrity. However, such techniques are typically reactive approaches to identify the root …