LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering
Cyber threat hunting is a proactive search process for hidden threats in an organization’s information system. It is a crucial component of active defense against advanced persistent threats (APTs). However, most of the current threat hunting methods rely on Cyber Threat Intelligence (CTI), which ca...
Saved in:
Published in | Security and communication networks Vol. 2022; pp. 1 - 16 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
London
Hindawi
27.09.2022
John Wiley & Sons, Inc |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Be the first to leave a comment!