Detection rate and false alarm rate for Pagoda

Yulai Xie
Efficient intrusion detection and analysis of the security landscape in big data environments present challenge for today's users. Intrusion behavior can be described by provenance graphs that record the dependency relationships between intrusion processes and the infected files. Existing intrusion detection methods typically analyze and identify the anomaly either in a single provenance path or the whole provenance graph, neither of which can achieve the benefit on both detection accuracy and detection time. We propose...
This data repository is not currently reporting usage information. For information on how your repository can submit usage information, please see our documentation.