Categories
2026
A Beginner’s Guide to Provenance Graphs
Sentient: Detecting APTs Via Capturing Indirect Dependencies and Behavioral Logic
PanThreat: Global Resource-Based Anomaly Detection for APTs
MPKAN: APT Attack Detection on Audit Logs via Graph Semantic Enhancement
Brewing Vodka: Distilling Pure Knowledge for Lightweight Threat Detection in Audit Logs
Autumn: An Unsupervised APT Detection via Detailed Process-Level Analysis
2024
THREATRACE: Detecting and Tracing Host-Based Threats in Node Level Through Provenance Graph Learning
Linkless Link Prediction via Relational Distillation
FLASH: A Comprehensive Approach to Intrusion Detection via Provenance Graph Representation Learning
Graph embedding analysis
CONAN: A Practical Real-Time APT Detection System With High Accuracy and Efficiency
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
ProGraPher: An Anomaly Detection System based on Provenance Graph Embedding
HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows
Threat Hunting and Threat Detection