一、DARPA TC项目概述
一、DARPA TC项目概述
1.1
项目目标
1.2
项目技术领域划分
二、DARPA TC功守道
二、DARPA TC功守道
2.1
攻——精细丰富的APT场景模拟
2.2
守——打开行为的“黑箱”
三、总结
三、总结
参考文献:
[1] https://www.darpa.mil/program/transparent-computing
[2] Milajerdi S M, Gjomemo R, Eshete B, et al.Holmes: real-time apt detection through correlation of suspicious informationflows[C]. 2019 IEEE Symposium on Security and Privacy (SP), 2019: 1137-1152.
[3] Hossain M N, Sheikhi S, Sekar R. CombatingDependence Explosion in Forensic Analysis Using Alternative Tag PropagationSemantics[J].
[4] Pei K, Gu Z, Saltaformaggio B, et al. Hercule:Attack story reconstruction via community discovery on correlated log graph[C].Proceedings of the 32Nd Annual Conference on Computer Security Applications,2016: 583-595.
[5] Hassan W U, Guo S, Li D, et al. NoDoze:Combatting Threat Alert Fatigue with Automated Provenance Triage[C]. NDSS,2019.
- 左青龙
- 微信扫一扫
- 右白虎
- 微信扫一扫
评论