Provenance-based intrusion detection systems: A survey
Traditional Intrusion Detection Systems (IDS) cannot cope with the increasing number and
sophistication of cyberattacks such as Advanced Persistent Threats (APT). Due to their high …
sophistication of cyberattacks such as Advanced Persistent Threats (APT). Due to their high …
Provenance-based intrusion detection: opportunities and challenges
Intrusion detection is an arms race; attackers evade intrusion detection systems by
develo** new attack vectors to sidestep known defense mechanisms. Provenance …
develo** new attack vectors to sidestep known defense mechanisms. Provenance …
Pagoda: A hybrid approach to enable efficient real-time provenance based intrusion detection in big data environments
Efficient intrusion detection and analysis of the security landscape in big data environments
present challenge for today's users. Intrusion behavior can be described by provenance …
present challenge for today's users. Intrusion behavior can be described by provenance …
P-gaussian: provenance-based gaussian distribution for detecting intrusion behavior variants using high efficient and real time memory databases
It is increasingly important and a big challenge to detect intrusion behavior variants in
today's world. Previous host-based intrusion detection methods typically explore the …
today's world. Previous host-based intrusion detection methods typically explore the …
Angus: efficient active learning strategies for provenance based intrusion detection
As modern attack methods become more concealed and complex, obtaining many labeled
samples in big data streams is difficult. Active learning has long been used to achieve better …
samples in big data streams is difficult. Active learning has long been used to achieve better …
Observed vs. Possible Provenance (Research Track)
Provenance has been of interest to the Computer Science community for nearly two
decades, with proposed uses ranging from data authentication, to security auditing, to …
decades, with proposed uses ranging from data authentication, to security auditing, to …
ProProv: A Language and Graphical Tool for Specifying Data Provenance Policies
K Dennis, S Engram, T Kaczmarek… - 2022 IEEE 4th …, 2022 - ieeexplore.ieee.org
The Function-as-a-Service cloud computing paradigm has made large-scale application
development convenient and efficient as developers no longer need to deploy or manage …
development convenient and efficient as developers no longer need to deploy or manage …
Specification, Enforcement, and Measurement of Integrity Policies
K Dennis - 2024 - search.proquest.com
The first step to improving an organization's security posture is to define the organization's
security goals. At a technical level, these goals are expressed as security policies. Security …
security goals. At a technical level, these goals are expressed as security policies. Security …
A dependently typed programming language with dynamic equality
M Lemay - 2022 - search.proquest.com
BOSTON UNIVERSITY GRADUATE SCHOOL OF ARTS AND SCIENCES Dissertation A
DEPENDENTLY TYPED PROGRAMMING LANGUAGE WITH DYNAMIC EQUALI Page 1 …
DEPENDENTLY TYPED PROGRAMMING LANGUAGE WITH DYNAMIC EQUALI Page 1 …
Proactive Provenance Policies for Automatic Cryptographic Data Centric Security
S Engram, T Kaczmarek, A Lee, D Bigelow - Provenance and Annotation of …, 2021 - Springer
Data provenance analysis has been used as an assistive measure for ensuring system
integrity. However, such techniques are typically reactive approaches to identify the root …
integrity. However, such techniques are typically reactive approaches to identify the root …