Provenance graph generation for intrusion detection
In today’s rapidly evolving threat landscape, the demand for robust defense mechanisms against zero-day attacks and other unforeseeable threats is escalating. As threat actors continually innovate, traditional security approaches struggle to keep pace, necessitating the exploration of novel strategi...
Saved in:
Main Author: | Lim, Janesse Ziyi |
---|---|
Other Authors: | Ke Yiping, Kelly |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2024
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/175398 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Provenance graph generation for intrusion detection
by: Chew, Perlyn Jie Ying
Published: (2023) -
Provenance graph generation for intrusion detection
by: Jabir Shah Halith
Published: (2022) -
Provenance graph generation for intrusion detection
by: Chong, Wai Mun
Published: (2023) -
Efficient provenance storage for relational queries
by: Bao, Z., et al.
Published: (2016) -
Automated signature creator for a signature based intrusion detection system (Pancakes)
by: De Ocampo, Frances Bernadette C., et al.
Published: (2013)