Provenance graph generation for intrusion detection

In this digital age, cyberattacks are becoming more complex, and are accompanied by increasingly severe consequences. Traditional intrusion detection systems are struggling to identify sophisticated threats such as zero-day attacks or Advanced Persistent Threats (APTs) efficiently and effectively. T...

Full description

Bibliographic Details
Main Author: Chew, Perlyn Jie Ying
Other Authors: Ke Yiping, Kelly
Format: Final Year Project (FYP)
Language:English
Published: Nanyang Technological University 2023
Subjects:
Online Access:https://hdl.handle.net/10356/171750