ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2308.05034
  4. Cited By
Kairos: Practical Intrusion Detection and Investigation using
  Whole-system Provenance

Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance

9 August 2023
Zijun Cheng
Qiujian Lv
Jinyuan Liang
Yan Wang
Degang Sun
Thomas Pasquier
Xueyuan Han
ArXivPDFHTML

Papers citing "Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance"

17 / 17 papers shown
Title
Modeling Behavioral Preferences of Cyber Adversaries Using Inverse Reinforcement Learning
Modeling Behavioral Preferences of Cyber Adversaries Using Inverse Reinforcement Learning
Aditya Shinde
Prashant Doshi
AAML
19
0
0
02 May 2025
Deep Learning-based Intrusion Detection Systems: A Survey
Deep Learning-based Intrusion Detection Systems: A Survey
Zhiwei Xu
Yujuan Wu
Shiheng Wang
Jiabao Gao
Tian Qiu
Ziqi Wang
Hai Wan
Xibin Zhao
26
1
0
10 Apr 2025
Sentient: Multi-Scenario Behavioral Intent Analysis for Advanced Persistent Threat Detection
Sentient: Multi-Scenario Behavioral Intent Analysis for Advanced Persistent Threat Detection
Wenhao Yan
Ning An
Wei Qiao
Weiheng Wu
Bo-Sian Jiang
Yuling Liu
Zhigang Lu
JunRong Liu
62
0
0
10 Feb 2025
SHIELD: APT Detection and Intelligent Explanation Using LLM
SHIELD: APT Detection and Intelligent Explanation Using LLM
Parth Atulbhai Gandhi
Prasanna N. Wudali
Yonatan Amaru
Yuval Elovici
A. Shabtai
AAML
61
1
0
04 Feb 2025
TFLAG:Towards Practical APT Detection via Deviation-Aware Learning on Temporal Provenance Graph
TFLAG:Towards Practical APT Detection via Deviation-Aware Learning on Temporal Provenance Graph
Wenhan Jiang
Tingting Chai
Hongri Liu
Kai Wang
Hongke Zhang
39
0
0
13 Jan 2025
CONTINUUM: Detecting APT Attacks through Spatial-Temporal Graph Neural Networks
CONTINUUM: Detecting APT Attacks through Spatial-Temporal Graph Neural Networks
Atmane Ayoub Mansour Bahar
Kamel Soaid Ferrahi
Mohamed-Lamine Messai
H. Seba
Karima Amrouche
36
0
0
08 Jan 2025
METANOIA: A Lifelong Intrusion Detection and Investigation System for Mitigating Concept Drift
J. Ying
Tiantian Zhu
Aohan Zheng
Tieming Chen
Mingqi Lv
Yan Chen
39
0
0
03 Jan 2025
SAGA: Synthetic Audit Log Generation for APT Campaigns
SAGA: Synthetic Audit Log Generation for APT Campaigns
Yi-Ting Huang
Y. Guo
Yuqing Yang
Guo-Wei Wong
Yu-Zih Jheng
Yeali S. Sun
Jessemyn Modini
Timothy Lynar
M. Chen
68
0
0
20 Nov 2024
Winemaking: Extracting Essential Insights for Efficient Threat Detection
  in Audit Logs
Winemaking: Extracting Essential Insights for Efficient Threat Detection in Audit Logs
Weiheng Wu
Wei Qiao
Wenhao Yan
Bo-Sian Jiang
Yuling Liu
Baoxu Liu
Zhigang Lu
JunRong Liu
34
0
0
05 Nov 2024
Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning
Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning
Wei Qiao
Yebo Feng
Teng Li
Zijian Zhang
Zhengzi Xu
Zhuo Ma
Yulong Shen
36
0
0
23 Oct 2024
CRUcialG: Reconstruct Integrated Attack Scenario Graphs by Cyber Threat
  Intelligence Reports
CRUcialG: Reconstruct Integrated Attack Scenario Graphs by Cyber Threat Intelligence Reports
Wenrui Cheng
Tiantian Zhu
Tieming Chen
Qixuan Yuan
J. Ying
Hongmei Li
Chunlin Xiong
Mingda Li
Mingqi Lv
Yan Chen
23
1
0
15 Oct 2024
HADES: Detecting Active Directory Attacks via Whole Network Provenance
  Analytics
HADES: Detecting Active Directory Attacks via Whole Network Provenance Analytics
Qi Liu
Kaibin Bao
Wajih Ul Hassan
V. Hagenmeyer
AAML
25
1
0
26 Jul 2024
Accurate and Scalable Detection and Investigation of Cyber Persistence
  Threats
Accurate and Scalable Detection and Investigation of Cyber Persistence Threats
Qi Liu
Muhammad Shoaib
M. U. Rehman
Kaibin Bao
V. Hagenmeyer
Wajih Ul Hassan
27
1
0
26 Jul 2024
From Sands to Mansions: Towards Automated Cyberattack Emulation with Classical Planning and Large Language Models
From Sands to Mansions: Towards Automated Cyberattack Emulation with Classical Planning and Large Language Models
Lingzhi Wang
Zhenyuan Li
Zonghan Guo
Yi Jiang
Kyle Jung
Kedar Thiagarajan
Jiahui Wang
Zhengkai Wang
Emily Wei
Xiangmin Shen
65
0
0
24 Jul 2024
Carbon Filter: Real-time Alert Triage Using Large Scale Clustering and
  Fast Search
Carbon Filter: Real-time Alert Triage Using Large Scale Clustering and Fast Search
Jonathan Oliver
Raghav Batta
Adam Bates
M. A. Inam
Shelly Mehta
Shugao Xia
20
0
0
07 May 2024
Incorporating Gradients to Rules: Towards Lightweight, Adaptive
  Provenance-based Intrusion Detection
Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection
Lingzhi Wang
Xiangmin Shen
Weijian Li
Zhenyuan Li
R. Sekar
Han Liu
Yan Chen
AAML
28
1
0
23 Apr 2024
threaTrace: Detecting and Tracing Host-based Threats in Node Level
  Through Provenance Graph Learning
threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Su Wang
Zhiliang Wang
Tao Zhou
Xia Yin
Dongqi Han
Han Zhang
Hongbin Sun
Xingang Shi
Jiahai Yang
24
69
0
08 Nov 2021
1