no code implementations • 23 Feb 2024 • Mingqi Lv, HongZhe Gao, Xuebo Qiu, Tieming Chen, Tiantian Zhu
The experiment results show that TREC significantly outperforms state-of-the-art systems in APT tactic recognition and TREC can also effectively identify APT techniques.
no code implementations • 16 Dec 2021 • Mingqi Lv, chengyu dong, Tieming Chen, Tiantian Zhu, Qijie Song, Yuan Fan
To effective and efficient detect cyber-attacks from a huge number of system events in the provenance data, we firstly model the provenance data by a heterogeneous graph to capture the rich context information of each system entities (e. g., process, file, socket, etc.
no code implementations • 14 May 2014 • Tieming Chen, Xu Zhang, Shichao Jin, Okhee Kim
In order to achieve high efficiency of classification in intrusion detection, a compressed model is proposed in this paper which combines horizontal compression with vertical compression.