A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
RAIN
2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17
As modern attacks become more stealthy and persistent, detecting or preventing them at their early stages becomes virtually impossible. Instead, an attack investigation or provenance system aims to continuously monitor and log interesting system events with minimal overhead. Later, if the system observes any anomalous behavior, it analyzes the log to identify who initiated the attack and which resources were affected by the attack and then assess and recover from any damage incurred. However,
doi:10.1145/3133956.3134045
dblp:conf/ccs/JiLDWFKOL17
fatcat:brdz6ihitjgpjksymswhbirebm