Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining 2016
DOI: 10.1145/2939672.2939783
|View full text |Cite
|
Sign up to set email alerts
|

Fast Memory-efficient Anomaly Detection in Streaming Heterogeneous Graphs

Abstract: Given a stream of heterogeneous graphs containing different types of nodes and edges, how can we spot anomalous ones in real-time while consuming bounded memory? This problem is motivated by and generalizes from its application in security to host-level advanced persistent threat (APT) detection. We propose StreamSpot, a clustering based anomaly detection approach that addresses challenges in two key fronts: (1) heterogeneity, and (2) streaming nature. We introduce a new similarity function for heterogeneous g… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
109
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 144 publications
(109 citation statements)
references
References 36 publications
(50 reference statements)
0
109
0
Order By: Relevance
“…Prior research [15], [83], [87] explored the use of data provenance for APT detection. However, these approaches all suffer from some combinations of the following limitations: L1 : Pre-defined edge-matching rules are overly sensitive and make it difficult to detect zero-day exploits common in APTs [87].…”
Section: Summary and Problem Statementmentioning
confidence: 99%
See 3 more Smart Citations
“…Prior research [15], [83], [87] explored the use of data provenance for APT detection. However, these approaches all suffer from some combinations of the following limitations: L1 : Pre-defined edge-matching rules are overly sensitive and make it difficult to detect zero-day exploits common in APTs [87].…”
Section: Summary and Problem Statementmentioning
confidence: 99%
“…However, conventional clustering approaches fail to capture a system's evolutionary behavior [8]. APT scenarios are sufficiently long term that failing to capture this behavior leads to too many false positives [83]. UNICORN leverages its streaming capability to create evolutionary models that capture normal changes in system behavior.…”
Section: Learning Evolutionary Modelsmentioning
confidence: 99%
See 2 more Smart Citations
“…[19][20][21][22] In addition, researchers have also developed methods of automating penetration testing and auditing. [19][20][21][22] In addition, researchers have also developed methods of automating penetration testing and auditing.…”
Section: Related Workmentioning
confidence: 99%