Advanced Persistent Threats (APT) are a class of security threats in which a well-resourced attacker targets a specific individual or organisation with a predefined goal. This typically involves exfiltration of confidential material, although increasingly attacks target the encryption or destruction of mission critical data. With traditional prevention and detection mechanisms failing to stem the tide of such attacks, there is a pressing need for new monitoring and analysis tools that reduce both false-positive rates and the cognitive burden on human analysts. We propose that local and distributed provenance metadata can simplify and improve monitoring and analysis of APTs by providing a single, authoritative sequence of events that capture...
International audienceLong lived attack campaigns known as Advanced Persistent Threats (APTs) have e...
International audienceLong lived attack campaigns known as Advanced Persistent Threats (APTs) have e...
Research on trusted computing focuses mainly on the security and integrity of the execution environm...
In the past 25 years, the World Wide Web has disrupted the way news are disseminated and consumed. H...
Data provenance refers to the history of creation and manipulation of a data object and is being wid...
Provenance is defined as the origin or the earliest known history of a thing. In the aspect of dat...
Efficient intrusion detection and analysis of the security landscape in big data environments presen...
International audienceIdentifying the root cause and impact of a system intrusion remains a foundati...
International audienceIdentifying the root cause and impact of a system intrusion remains a foundati...
Efficient intrusion detection and analysis of the security landscape in big data environments presen...
This paper elaborates on a novel approach at preventing exploits from vulnerabilities which remain u...
International audienceLong lived attack campaigns known as Advanced Persistent Threats (APTs) have e...
International audienceLong lived attack campaigns known as Advanced Persistent Threats (APTs) have e...
International audienceLong lived attack campaigns known as Advanced Persistent Threats (APTs) have e...
International audienceLong lived attack campaigns known as Advanced Persistent Threats (APTs) have e...
International audienceLong lived attack campaigns known as Advanced Persistent Threats (APTs) have e...
International audienceLong lived attack campaigns known as Advanced Persistent Threats (APTs) have e...
Research on trusted computing focuses mainly on the security and integrity of the execution environm...
In the past 25 years, the World Wide Web has disrupted the way news are disseminated and consumed. H...
Data provenance refers to the history of creation and manipulation of a data object and is being wid...
Provenance is defined as the origin or the earliest known history of a thing. In the aspect of dat...
Efficient intrusion detection and analysis of the security landscape in big data environments presen...
International audienceIdentifying the root cause and impact of a system intrusion remains a foundati...
International audienceIdentifying the root cause and impact of a system intrusion remains a foundati...
Efficient intrusion detection and analysis of the security landscape in big data environments presen...
This paper elaborates on a novel approach at preventing exploits from vulnerabilities which remain u...
International audienceLong lived attack campaigns known as Advanced Persistent Threats (APTs) have e...
International audienceLong lived attack campaigns known as Advanced Persistent Threats (APTs) have e...
International audienceLong lived attack campaigns known as Advanced Persistent Threats (APTs) have e...
International audienceLong lived attack campaigns known as Advanced Persistent Threats (APTs) have e...
International audienceLong lived attack campaigns known as Advanced Persistent Threats (APTs) have e...
International audienceLong lived attack campaigns known as Advanced Persistent Threats (APTs) have e...
Research on trusted computing focuses mainly on the security and integrity of the execution environm...