• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Li, Teng (Li, Teng.) [1] | Liu, Ximeng (Liu, Ximeng.) [2] | Qiao, Wei (Qiao, Wei.) [3] | Zhu, Xiongjie (Zhu, Xiongjie.) [4] | Shen, Yulong (Shen, Yulong.) [5] | Ma, Jianfeng (Ma, Jianfeng.) [6]

Indexed by:

EI

Abstract:

Advanced Persistent Threats (APTs) employ sophisticated and covert tactics to infiltrate target systems, leading to increased vulnerability and an elevated risk of exposure. Consequently, it is essential for us to proactively create an extensive and clearly outlined attack chain for APTs in order to effectively combat these threats. Unlike traditional malware or application threats, APTs can sidestep cyber security efforts and cause severe damage to organizations or even state security. Nonetheless, earlier methods struggle to accurately track APTs and may face a dependency explosion issue, as identifying the intricate and complex unknown malicious activities within APTs proves to be challenging. In this paper, we propose and build an approach, T-trace, which constructs the events provenance graphs by analyzing the correlations among logs. The approach precisely finds the log communities with tensor decomposition and calculates significance scores to extract the events. The APTs can be inferred by discovering the event communities and constructing the provenance graph with log correlation. In the experiment, we used DARPA data sets and launched four current practical APTs. Compared with current approaches, the results show that T-trace can efficiently reduce time cost by 90% and achieve a 92% accuracy rate in constructing the provenance graph, which can be practically applied in APTs provenance. © 2004-2012 IEEE.

Keyword:

Behavioral research Cybersecurity Feature extraction Malware Remote control Tensors

Community:

  • [ 1 ] [Li, Teng]Xidian University, School of Cyber Engineering, Xi'an; 710071, China
  • [ 2 ] [Liu, Ximeng]Fuzhou University, College of Computer and Data Science, Fuzhou; 350108, China
  • [ 3 ] [Qiao, Wei]Chinese Academy of Sciences, Institute of Information Engineering, Beijing; 100085, China
  • [ 4 ] [Zhu, Xiongjie]Xidian University, School of Cyber Engineering, Xi'an; 710071, China
  • [ 5 ] [Shen, Yulong]Xidian University, School of Computer Science and Technology, Xi'an; 710071, China
  • [ 6 ] [Ma, Jianfeng]Xidian University, School of Cyber Engineering, Xi'an; 710071, China

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Dependable and Secure Computing

ISSN: 1545-5971

Year: 2024

Issue: 3

Volume: 21

Page: 1179-1195

7 . 0 0 0

JCR@2023

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Affiliated Colleges:

Online/Total:946/13864544
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1