Proceedings of the 32nd Annual Conference on Computer Security Applications 2016
DOI: 10.1145/2991079.2991122
|View full text |Cite
|
Sign up to set email alerts
|

Hercule

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 97 publications
(11 citation statements)
references
References 33 publications
0
11
0
Order By: Relevance
“…The provenance analysis mechanism takes log entries as input, performs suitable queries over the entries, and outputs necessary attack information. It explains how closely different system events (both benign and malicious events) are interrelated [16], and what is the underlying behaviour of an attack.…”
Section: Provenance Analysis Componentmentioning
confidence: 99%
See 1 more Smart Citation
“…The provenance analysis mechanism takes log entries as input, performs suitable queries over the entries, and outputs necessary attack information. It explains how closely different system events (both benign and malicious events) are interrelated [16], and what is the underlying behaviour of an attack.…”
Section: Provenance Analysis Componentmentioning
confidence: 99%
“…A limited number of research efforts concentrate on online (on-the-fly) provenance reduction [20]. Similarly, data analysis and anomaly detection through provenance data can be conducted in either post-hoc methods [16] or real time schemes [21]. The detection capability and accuracy continue to improve with the fast development and adoption of machine learning and AI mechanisms in provenance.…”
Section: Introductionmentioning
confidence: 99%
“…Regardless, we believe these techniques are interoperable with LogApprox, although they may not be as essential because LogApprox already removes a large percentage of false dependencies related to benign execution units. Prior work also considers related semantic gap problems, including the reconciliation of system-level logs with application logs [32,61] and the identification of high-level semantic behaviors [34,46,73]. These techniques should also be compatible with LogApprox, provided that the analyst is only interested in fully reconstructing attack-related sequences of events.…”
Section: Related Workmentioning
confidence: 99%
“…Audit logs have proven invaluable to these tasks; today, 75% of cyber analysts report that logs are the most important resource when investigating threats [10]. The importance of audit logs will only increase as state-of-the-art causal analysis techniques for detection [22,26,52,54,74], alert triage [29,30], and investigation [32,34,42,61] become widely available.…”
Section: Introductionmentioning
confidence: 99%
“…Additionally, in [14] the authors proposed a technique to model attack propagation through a network. In [15] the authors introduced models to analyze the ability of various log files and algorithms to support the detection of various recent attacks. While work by [16] demonstrates a host-based coverage of known adversarial techniques, but does not expand to a entire network.…”
Section: Related Workmentioning
confidence: 99%