HADES: Detecting Active Directory Attacks via Whole Network Provenance Analytics.
Qi LiuKaibin BaoWajih Ul HassanVeit HagenmeyerPublished in: CoRR (2024)
Keyphrases
- metadata
- traffic analysis
- network structure
- network model
- case study
- security threats
- network anomaly detection
- data management
- hierarchical structure
- network traffic
- computer networks
- data mining
- security protocols
- network management
- communication networks
- security measures
- peer to peer
- wireless sensor networks
- databases
- security risks
- fault injection
- buffer overflow
- ddos attacks
- countermeasures
- network security
- big data
- data quality
- complex networks
- data analysis
- social networks