Enhancing Cybersecurity through Robust Provenance Graph-Based Defense Against Advanced Persistent Threats
A novel provenance graph-based approach that efficiently reconstructs lateral attack chains, detects dynamic evasion behaviors, and defends against adversarial subgraph attacks to enhance cybersecurity against advanced persistent threats.