Advanced Persistent Threats (APTs) are the most sophisticated attacks for modern information systems. Currently, more and more researchers begin to focus on graph-based anomaly detection methods that leverage graph data to model normal behaviors and detect outliers for defending against APTs. However, previous studies of provenance graphs mainly concentrate on system calls, leading to difficulties in modeling network behaviors. Coarse-grained correlation graphs depend on handcrafted graph construction rules and, thus, cannot adequately explore log node attributes. Besides, the traditional Graph Neural Networks (GNNs) fail to consider meaningful edge features and are difficult to perform heterogeneous graphs embedding. To overcome the limita...
Network security analysis based on attack graphs has been applied extensively in recent years. The r...
Complex networks emerge as a natural framework to describe real-life phe- nomena involving a group o...
International audienceDefenders fighting against Advanced Persistent Threats need to discover the pr...
An Advanced Persistent Threat (APT) is an emerging attack against Industrial Control and Automation ...
We present a novel Deep Learning (DL) stack for detecting Advanced Persistent threat (APT) attacks....
International audienceDespite fruitful achievements made by unsupervised machine learning-based anom...
Advanced Persistent Threats (APTs) are characterized by their complexity and ability to stay relativ...
Abstract — The annual incidence of insider attacks continues to grow, and there are indications this...
Graphs are used widely to model complex systems, and detecting anomalies in a graph is an important ...
Effectively detecting anomalous nodes in attributed networks is crucial for the success of many real...
Effectively detecting anomalous nodes in attributed networks is crucial for the success of many real...
Advanced Persistent Threats (APTs) have been a major challenge in securing both Information Technolo...
Graph Neural Networks (GNNs) have recently emerged as powerful tools for detecting network attacks, ...
Graph neural networks (GNNs) have been very successful at solving fraud detection tasks. The GNN-bas...
Botnets are an ever-growing threat to private users, small companies, and even large corporations. T...
Network security analysis based on attack graphs has been applied extensively in recent years. The r...
Complex networks emerge as a natural framework to describe real-life phe- nomena involving a group o...
International audienceDefenders fighting against Advanced Persistent Threats need to discover the pr...
An Advanced Persistent Threat (APT) is an emerging attack against Industrial Control and Automation ...
We present a novel Deep Learning (DL) stack for detecting Advanced Persistent threat (APT) attacks....
International audienceDespite fruitful achievements made by unsupervised machine learning-based anom...
Advanced Persistent Threats (APTs) are characterized by their complexity and ability to stay relativ...
Abstract — The annual incidence of insider attacks continues to grow, and there are indications this...
Graphs are used widely to model complex systems, and detecting anomalies in a graph is an important ...
Effectively detecting anomalous nodes in attributed networks is crucial for the success of many real...
Effectively detecting anomalous nodes in attributed networks is crucial for the success of many real...
Advanced Persistent Threats (APTs) have been a major challenge in securing both Information Technolo...
Graph Neural Networks (GNNs) have recently emerged as powerful tools for detecting network attacks, ...
Graph neural networks (GNNs) have been very successful at solving fraud detection tasks. The GNN-bas...
Botnets are an ever-growing threat to private users, small companies, and even large corporations. T...
Network security analysis based on attack graphs has been applied extensively in recent years. The r...
Complex networks emerge as a natural framework to describe real-life phe- nomena involving a group o...
International audienceDefenders fighting against Advanced Persistent Threats need to discover the pr...