2016
DOI: 10.1016/j.future.2016.02.005
|View full text |Cite
|
Sign up to set email alerts
|

Unifying intrusion detection and forensic analysis via provenance awareness

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(13 citation statements)
references
References 32 publications
0
13
0
Order By: Relevance
“…Jiang et al [39] used process coloring approach to identify the intrusion entry point and then use taint propagation approach to reduce log entries. Xie et al [66] used high-level dependency information to detect malicious behaviour. However, this system only considered one event at a time without malicious behaviour propagation i.e.…”
Section: Related Workmentioning
confidence: 99%
“…Jiang et al [39] used process coloring approach to identify the intrusion entry point and then use taint propagation approach to reduce log entries. Xie et al [66] used high-level dependency information to detect malicious behaviour. However, this system only considered one event at a time without malicious behaviour propagation i.e.…”
Section: Related Workmentioning
confidence: 99%
“…As provenance is adopted in several domains (e.g., search, experimental document and security), various provenance processing systems have been developed, such as PASS [ 32 ], SPADE [ 33 ], Hi-Fi [ 34 ], and LPM [ 35 ]. Based on PASS and PIDAS [ 36 ] (a previous IDS developed by the same authors), Pagoda recognises intrusions by calculating the anomaly degree of not a single provenance path but also of the overall graph. In particular, its operation consists of three main steps.…”
Section: Related Work and Contributionsmentioning
confidence: 99%
“…(1) Data is collected by the LPM-enabled kernel and sent to a central location via a message bus (ActiveMQ) by a daemon running on each LPM node. (2) The data is translated from LPM events Each LPM event generates a single node and edge that must be encoded and stored in Accumulo. We rely on D4M [8] to encode the nodes and edges of the provenance graph.…”
Section: Designmentioning
confidence: 99%
“…Data provenance provides a history of the data as it is processed. This history has a variety of uses, including protecting against malicious changes [1], and detecting attacks that occur on the system [2]. Many of the use cases for provenance require collection of large volumes of information, such as from whole-system provenance collectors, e.g.…”
Section: Introductionmentioning
confidence: 99%