- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Anomaly Detection Techniques and Applications
- Network Packet Processing and Optimization
- Advanced Malware Detection Techniques
- Software System Performance and Reliability
- Information and Cyber Security
Institute of Information Engineering
2023-2024
University of Chinese Academy of Sciences
2023-2024
Chinese Academy of Sciences
2023-2024
Abstract Advanced Persistent Threats (APTs) achieves internal networks penetration through multiple methods, making it difficult to detect attack clues solely boundary defense measures. To address this challenge, some research has proposed threat detection methods based on provenance graphs, which leverage entity relationships such as processes, files, and sockets found in host audit logs. However, these are generally inefficient, especially when faced with massive logs the computational...