LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering

Cyber threat hunting is a proactive search process for hidden threats in an organization’s information system. It is a crucial component of active defense against advanced persistent threats (APTs). However, most of the current threat hunting methods rely on Cyber Threat Intelligence (CTI), which ca...

Full description

Saved in:
Bibliographic Details
Published inSecurity and communication networks Vol. 2022; pp. 1 - 16
Main Authors Li, Jiawei, Zhang, Ru, Liu, Jianyi, Liu, Gongshen
Format Journal Article
LanguageEnglish
Published London Hindawi 27.09.2022
John Wiley & Sons, Inc
Subjects
Online AccessGet full text

Cover

Loading…