DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation.
Zhiqiang XuPengcheng FangChanglin LiuXusheng XiaoYu WenDan MengPublished in: IEEE Symposium on Security and Privacy (2022)
Keyphrases
- mutual reinforcement
- graph theory
- graph structure
- intrusion detection
- attack graph
- random walk
- connected components
- directed graph
- graph representation
- graph model
- directed acyclic graph
- graph based algorithm
- dependency graph
- secret key
- countermeasures
- weighted graph
- bipartite graph
- graph matching
- undirected graph
- graph mining
- graph partitioning
- website
- multi document summarization
- structured data
- graphical models