Zero Day Threat Detection Using Graph and Flow Based Security Telemetry.
Christopher RedinoDhruv NandakumarRobert SchillerKevin ChoiAbdul RahmanEdward BowenMatthew WeeksAaron ShahaJoe NehilaPublished in: CoRR (2022)
Keyphrases
- information security
- object detection
- detection algorithm
- access control
- graph theoretic
- graph representation
- countermeasures
- automatic detection
- information flow
- network security
- selecting a small number
- malware detection
- graph matching
- detection rate
- false positives
- detection method
- random walk
- bipartite graph
- weighted graph
- false alarms
- graph model
- spanning tree
- directed graph
- computer security
- security analysis
- security architecture