Publication | Closed Access
Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems
38
Citations
58
References
2023
Year
Unknown Venue
Host-based Anomaly DetectionAnomaly DetectionEngineeringInformation SecurityDiagnosisInformation ForensicsGraph DatabaseAudit EventsData ProvenanceData ScienceData MiningManagementData IntegrationData ManagementIntrusion Detection SystemIntrusion ToleranceKnowledge DiscoveryComputer ScienceProvenance AnalysisData SecuritySecurity VisualizationGraph TheoryForrest IdsProvenance ManagementIntrusion DetectionNovelty DetectionEvent-driven Monitoring
IDS would refine this technique and incorporate additional host context (e.g., argument dataflows [13]), the Forrest IDS codifies the general strategy for host-based anomaly detection: monitor a stream of audit events to differentiate typical behaviors from anomalous (potentially malicious) activity.
| Year | Citations | |
|---|---|---|
Page 1
Page 1