no code implementations • 16 Dec 2021 • Mingqi Lv, chengyu dong, Tieming Chen, Tiantian Zhu, Qijie Song, Yuan Fan
To effective and efficient detect cyber-attacks from a huge number of system events in the provenance data, we firstly model the provenance data by a heterogeneous graph to capture the rich context information of each system entities (e. g., process, file, socket, etc.