Probabilistically Inferring Attack Ramifications Using Temporal Dependence Network.
IEEE Transactions on Information Forensics and Security(2018)
摘要
There is an increasing need of assessing and mitigating the effects of successful attacks. Uncovering malicious and contaminated objects in an attacked computing system is referred to as identification of attack ramifications. Previous methods identify the attack ramifications by directly tracking information flows (or dependences) from the intrusion root (i.e., the entry point of an attack). They...
更多查看译文
关键词
Security,Probabilistic logic,Explosions,Object recognition,Malware,Bayes methods,Uncertainty
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络