ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2308.05034
  4. Cited By
Kairos: Practical Intrusion Detection and Investigation using
  Whole-system Provenance
v1v2v3 (latest)

Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance

IEEE Symposium on Security and Privacy (IEEE S&P), 2023
9 August 2023
Zijun Cheng
Qiujian Lv
Jinyuan Liang
Yan Wang
Degang Sun
Thomas Pasquier
Xueyuan Han
ArXiv (abs)PDFHTML

Papers citing "Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance"

32 / 32 papers shown
Title
GraphFaaS: Serverless GNN Inference for Burst-Resilient, Real-Time Intrusion Detection
GraphFaaS: Serverless GNN Inference for Burst-Resilient, Real-Time Intrusion Detection
Lingzhi Wang
V. Yegneswaran
Xinyi Shi
Ziyu Li
Ashish Gehani
Yan Chen
36
0
0
13 Nov 2025
SecTracer: A Framework for Uncovering the Root Causes of Network Intrusions via Security Provenance
SecTracer: A Framework for Uncovering the Root Causes of Network Intrusions via Security Provenance
Seunghyeon Lee
Hyunmin Seo
Hwanjo Heo
Anduo Wang
Seungwon Shin
Jinwoo Kim
56
0
0
12 Nov 2025
TPPR: APT Tactic / Technique Pattern Guided Attack Path Reasoning for Attack Investigation
TPPR: APT Tactic / Technique Pattern Guided Attack Path Reasoning for Attack Investigation
Qi Sheng
81
0
0
25 Oct 2025
OCR-APT: Reconstructing APT Stories from Audit Logs using Subgraph Anomaly Detection and LLMs
OCR-APT: Reconstructing APT Stories from Audit Logs using Subgraph Anomaly Detection and LLMs
Ahmed Aly
Essam Mansour
Amr Youssef
98
2
0
16 Oct 2025
Ancora: Accurate Intrusion Recovery for Web Applications
Ancora: Accurate Intrusion Recovery for Web Applications
Yihao Peng
Biao Ma
Hai Wan
Xibin Zhao
67
0
0
09 Oct 2025
Rethinking Provenance Completeness with a Learning-Based Linux Scheduler
Rethinking Provenance Completeness with a Learning-Based Linux Scheduler
Jinsong Mao
Benjamin E. Ujcich
Shiqing Ma
108
0
0
09 Oct 2025
KnowHow: Automatically Applying High-Level CTI Knowledge for Interpretable and Accurate Provenance Analysis
KnowHow: Automatically Applying High-Level CTI Knowledge for Interpretable and Accurate Provenance Analysis
Yuhan Meng
Shaofei Li
Jiaping Gui
Peng Jiang
Ding Li
52
1
0
06 Sep 2025
An Automated Attack Investigation Approach Leveraging Threat-Knowledge-Augmented Large Language Models
An Automated Attack Investigation Approach Leveraging Threat-Knowledge-Augmented Large Language Models
Rujie Dai
Peizhuo Lv
Yujiang Gui
Qiujian Lv
Yuanyuan Qiao
Yan Wang
Degang Sun
Weiqing Huang
Yingjiu Li
X. Wang
88
0
0
01 Sep 2025
LLM-driven Provenance Forensics for Threat Investigation and Detection
LLM-driven Provenance Forensics for Threat Investigation and Detection
Kunal Mukherjee
Murat Kantarcioglu
60
2
0
29 Aug 2025
A Guide to Stakeholder Analysis for Cybersecurity Researchers
A Guide to Stakeholder Analysis for Cybersecurity Researchers
James C. Davis
Sophie Chen
Huiyun Peng
Paschal C. Amusuo
Kelechi G. Kalu
56
3
0
20 Aug 2025
MirGuard: Towards a Robust Provenance-based Intrusion Detection System Against Graph Manipulation Attacks
MirGuard: Towards a Robust Provenance-based Intrusion Detection System Against Graph Manipulation Attacks
Anyuan Sang
Lu Zhou
Li Yang
Junbo Jia
Huipeng Yang
Pengbin Feng
Jianfeng Ma
AAML
83
0
0
14 Aug 2025
PROVCREATOR: Synthesizing Complex Heterogenous Graphs with Node and Edge Attributes
PROVCREATOR: Synthesizing Complex Heterogenous Graphs with Node and Edge Attributes
Tianhao Wang
Simon Klancher
Kunal Mukherjee
Josh Wiedemeier
Feng Chen
Murat Kantarcioglu
Kangkook Jee
138
1
0
28 Jul 2025
Few-Shot Learning-Based Cyber Incident Detection with Augmented Context Intelligence
Few-Shot Learning-Based Cyber Incident Detection with Augmented Context IntelligenceAnnual International Computer Software and Applications Conference (COMPSAC), 2025
Fei Zuo
Junghwan Rhee
Yung Ryn Choe
Chenglong Fu
Xianshan Qu
AAML
93
1
0
19 Jun 2025
TriPSS: A Tri-Modal Keyframe Extraction Framework Using Perceptual, Structural, and Semantic Representations
TriPSS: A Tri-Modal Keyframe Extraction Framework Using Perceptual, Structural, and Semantic Representations
Mert Can Cakmak
Nitin Agarwal
Diwash Poudel
174
0
0
03 Jun 2025
Modeling Behavioral Preferences of Cyber Adversaries Using Inverse Reinforcement Learning
Modeling Behavioral Preferences of Cyber Adversaries Using Inverse Reinforcement Learning
Aditya Shinde
Prashant Doshi
AAML
163
0
0
02 May 2025
Deep Learning-based Intrusion Detection Systems: A Survey
Deep Learning-based Intrusion Detection Systems: A Survey
Zhiwei Xu
Yujuan Wu
Shiheng Wang
Jiabao Gao
Tian Qiu
Ziqi Wang
Hai Wan
Xibin Zhao
267
11
0
10 Apr 2025
Sentient: Multi-Scenario Behavioral Intent Analysis for Advanced Persistent Threat Detection
Sentient: Multi-Scenario Behavioral Intent Analysis for Advanced Persistent Threat Detection
Wenhao Yan
Ning An
Wei Qiao
Weiheng Wu
Bo-Sian Jiang
Yuling Liu
Zhigang Lu
JunRong Liu
297
0
0
10 Feb 2025
SHIELD: APT Detection and Intelligent Explanation Using LLM
SHIELD: APT Detection and Intelligent Explanation Using LLM
Parth Atulbhai Gandhi
Prasanna N. Wudali
Yonatan Amaru
Yuval Elovici
A. Shabtai
AAML
261
4
0
04 Feb 2025
TFLAG:Towards Practical APT Detection via Deviation-Aware Learning on Temporal Provenance Graph
TFLAG:Towards Practical APT Detection via Deviation-Aware Learning on Temporal Provenance Graph
Wenhan Jiang
Tingting Chai
Hongri Liu
Kai Wang
Hongke Zhang
230
0
0
13 Jan 2025
CONTINUUM: Detecting APT Attacks through Spatial-Temporal Graph Neural Networks
CONTINUUM: Detecting APT Attacks through Spatial-Temporal Graph Neural Networks
Atmane Ayoub Mansour Bahar
Kamel Soaid Ferrahi
Mohamed-Lamine Messai
H. Seba
Karima Amrouche
297
2
0
08 Jan 2025
DEHYDRATOR: Enhancing Provenance Graph Storage via Hierarchical Encoding and Sequence GenerationIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2024
J. Ying
Tiantian Zhu
Mingqi Lv
Tieming Chen
109
0
0
03 Jan 2025
METANOIA: A Lifelong Intrusion Detection and Investigation System for Mitigating Concept Drift
J. Ying
Tiantian Zhu
Aohan Zheng
Tieming Chen
Mingqi Lv
Yan Chen
193
1
0
03 Jan 2025
SAGA: Synthetic Audit Log Generation for APT Campaigns
SAGA: Synthetic Audit Log Generation for APT Campaigns
Yi-Ting Huang
Y. Guo
Yue Yang
Guo-Wei Wong
Yu-Zih Jheng
Yeali S. Sun
Jessemyn Modini
Timothy Lynar
M. Chen
213
3
0
20 Nov 2024
Winemaking: Extracting Essential Insights for Efficient Threat Detection
  in Audit Logs
Winemaking: Extracting Essential Insights for Efficient Threat Detection in Audit Logs
Weiheng Wu
Wei Qiao
Wenhao Yan
Bo-Sian Jiang
Yuling Liu
Baoxu Liu
Zhigang Lu
JunRong Liu
247
0
0
05 Nov 2024
Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning
Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning
Wei Qiao
Yebo Feng
Teng Li
Zijian Zhang
Yulong Shen
Zhuo Ma
Yulong Shen
704
3
0
23 Oct 2024
CRUcialG: Reconstruct Integrated Attack Scenario Graphs by Cyber Threat
  Intelligence Reports
CRUcialG: Reconstruct Integrated Attack Scenario Graphs by Cyber Threat Intelligence ReportsIEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2024
Wenrui Cheng
Tiantian Zhu
Tieming Chen
Qixuan Yuan
J. Ying
Hongmei Li
Chunlin Xiong
Mingda Li
Mingqi Lv
Yan Chen
201
5
0
15 Oct 2024
HADES: Detecting Active Directory Attacks via Whole Network Provenance
  Analytics
HADES: Detecting Active Directory Attacks via Whole Network Provenance Analytics
Qi Liu
Kaibin Bao
Wajih Ul Hassan
V. Hagenmeyer
AAML
134
2
0
26 Jul 2024
Accurate and Scalable Detection and Investigation of Cyber Persistence
  Threats
Accurate and Scalable Detection and Investigation of Cyber Persistence Threats
Qi Liu
Muhammad Shoaib
M. U. Rehman
Kaibin Bao
V. Hagenmeyer
Wajih Ul Hassan
179
2
0
26 Jul 2024
From Sands to Mansions: Towards Automated Cyberattack Emulation with Classical Planning and Large Language Models
From Sands to Mansions: Towards Automated Cyberattack Emulation with Classical Planning and Large Language Models
Lingzhi Wang
Zhenyuan Li
Zonghan Guo
Yi Jiang
Kyle Jung
Kedar Thiagarajan
Jiahui Wang
Zhengkai Wang
Emily Wei
Xiangmin Shen
237
0
0
24 Jul 2024
RAPID: Robust APT Detection and Investigation Using Context-Aware Deep
  Learning
RAPID: Robust APT Detection and Investigation Using Context-Aware Deep LearningComputer Networks (CN), 2024
Yonatan Amaru
Prasanna N. Wudali
Yuval Elovici
A. Shabtai
136
4
0
08 Jun 2024
Carbon Filter: Real-time Alert Triage Using Large Scale Clustering and
  Fast Search
Carbon Filter: Real-time Alert Triage Using Large Scale Clustering and Fast Search
Jonathan Oliver
Raghav Batta
Adam Bates
M. A. Inam
Shelly Mehta
Shugao Xia
101
2
0
07 May 2024
Incorporating Gradients to Rules: Towards Lightweight, Adaptive
  Provenance-based Intrusion Detection
Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection
Lingzhi Wang
Xiangmin Shen
Weijian Li
Zhenyuan Li
R. Sekar
Han Liu
Yan Chen
AAML
226
11
0
23 Apr 2024
1