A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Transparent Web Service Auditing via Network Provenance Functions
2017
Proceedings of the 26th International Conference on World Wide Web - WWW '17
Detecting and explaining the nature of attacks in distributed web services is often difficult -determining the nature of suspicious activity requires following the trail of an attacker through a chain of heterogeneous software components including load balancers, proxies, worker nodes, and storage services. Unfortunately, existing forensic solutions cannot provide the necessary context to link events across complex workflows, particularly in instances where application layer semantics (e.g.,
doi:10.1145/3038912.3052640
dblp:conf/www/BatesHBDRCMS17
fatcat:vplzmesjqnfl3c6vt6wsya7m2m