Provenance graph generation for intrusion detection
In this digital age, cyberattacks are becoming more complex, and are accompanied by increasingly severe consequences. Traditional intrusion detection systems are struggling to identify sophisticated threats such as zero-day attacks or Advanced Persistent Threats (APTs) efficiently and effectively. T...
Saved in:
Main Author: | Chew, Perlyn Jie Ying |
---|---|
Other Authors: | Ke Yiping, Kelly |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2023
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/171750 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Provenance graph generation for intrusion detection
by: Chong, Wai Mun
Published: (2023) -
Provenance graph generation for intrusion detection
by: Jabir Shah Halith
Published: (2022) -
Provenance graph generation for intrusion detection
by: Lim, Janesse Ziyi
Published: (2024) -
Provenance-based intrusion detection
by: Ng, Joel Soon En
Published: (2022) -
Provenance-based intrusion detection
by: Lim, Qian Hui
Published: (2023)