Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems.
Akul GoyalXueyuan HanGang WangAdam BatesPublished in: NDSS (2023)
Keyphrases
- intrusion detection system
- intrusion detection
- network intrusion detection systems
- attack detection
- intrusion prevention
- cyber attacks
- network attacks
- computer security
- network intrusions
- network security
- attack scenarios
- misuse detection
- denial of service attacks
- malicious activities
- normal behavior
- anomaly detection
- network intrusion
- network intrusion detection
- network traffic
- network traffic data
- computer networks
- countermeasures
- traffic analysis
- alert correlation
- computer systems
- normal traffic
- distributed intrusion detection
- attack graph
- security measures
- cyber security
- dos attacks
- metadata
- security mechanisms
- information security
- data mining techniques
- multistage
- text classification
- databases