{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:22:15Z","timestamp":1730326935520,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3607199.3607201","type":"proceedings-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T22:30:51Z","timestamp":1696372251000},"page":"77-91","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["EdgeTorrent: Real-time Temporal Graph Representations for Intrusion Detection"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-2866-4135","authenticated-orcid":false,"given":"Isaiah J.","family":"King","sequence":"first","affiliation":[{"name":"The George Washington University, United States of America"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7381-7041","authenticated-orcid":false,"given":"Xiaokui","family":"Shu","sequence":"additional","affiliation":[{"name":"IBM Research, United States of America"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8111-2503","authenticated-orcid":false,"given":"Jiyong","family":"Jang","sequence":"additional","affiliation":[{"name":"IBM Research, United States of America"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7040-1657","authenticated-orcid":false,"given":"Kevin","family":"Eykholt","sequence":"additional","affiliation":[{"name":"IBM Research, United States of America"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1015-7004","authenticated-orcid":false,"given":"Taesung","family":"Lee","sequence":"additional","affiliation":[{"name":"IBM Research, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8588-7680","authenticated-orcid":false,"given":"H. Howie","family":"Huang","sequence":"additional","affiliation":[{"name":"The George Washington University, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Intel\u00ae Xeon\u00ae processor E5-2690 V4 (35m cache 2.60 GHz) - product specifications. https:\/\/www.intel.com\/content\/www\/us\/en\/products\/sku\/91770\/intel-xeon-processor-e52690-v4-35m-cache-2-60-ghz\/specifications.html"},{"key":"e_1_3_2_1_2_1","unstructured":"July. Shelve \u2014 Python object persistence \u2014 Python 3.10.5 documentation. https:\/\/docs.python.org\/3\/library\/shelve.html. (Accessed on 07\/18\/2022)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.385"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477314.3507097"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI47803.2020.9308512"},{"volume-title":"Longformer: The long-document transformer. arXiv preprint arXiv:2004.05150","year":"2020","author":"Beltagy Iz","key":"e_1_3_2_1_6_1","unstructured":"Iz Beltagy, Matthew\u00a0E Peters, and Arman Cohan. 2020. Longformer: The long-document transformer. arXiv preprint arXiv:2004.05150 (2020)."},{"volume-title":"11th International Workshop on Theory and Practice of Provenance (TaPP","year":"2019","author":"Berrada Ghita","key":"e_1_3_2_1_7_1","unstructured":"Ghita Berrada and James Cheney. 2019. Aggregating unsupervised provenance anomaly detectors. In 11th International Workshop on Theory and Practice of Provenance (TaPP 2019)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.02.015"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5724"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3523261"},{"volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID","year":"2020","author":"Bowman Benjamin","key":"e_1_3_2_1_11_1","unstructured":"Benjamin Bowman, Craig Laprade, Yuede Ji, and H\u00a0Howie Huang. 2020. Detecting lateral movement in enterprise computer networks with unsupervised graph { AI}. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). 257\u2013268."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2693418"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1021\/acs.jcim.8b00839"},{"volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805","year":"2018","author":"Devlin Jacob","key":"e_1_3_2_1_14_1","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)."},{"volume-title":"Generative adversarial nets. Advances in neural information processing systems 27","year":"2014","author":"Goodfellow Ian","key":"e_1_3_2_1_15_1","unstructured":"Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. Advances in neural information processing systems 27 (2014)."},{"volume-title":"Conference on neural information processing systems (NeurIPS) 31","year":"2017","author":"Hamilton Will","key":"e_1_3_2_1_16_1","unstructured":"Will Hamilton, Zhitao Ying, and Jure Leskovec. 2017. Inductive representation learning on large graphs. Conference on neural information processing systems (NeurIPS) 31 (2017)."},{"key":"e_1_3_2_1_17_1","first-page":"851","article-title":"TDMCS: an efficient method for mining closed frequent patterns over data streams based on time decay model.Int","volume":"14","author":"Han Meng","year":"2017","unstructured":"Meng Han, Jian Ding, and Juan Li. 2017. TDMCS: an efficient method for mining closed frequent patterns over data streams based on time decay model.Int. Arab J. Inf. Technol. 14, 6 (2017), 851\u2013860.","journal-title":"Arab J. Inf. Technol."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24046"},{"volume-title":"10th USENIX Workshop on the Theory and Practice of Provenance (TaPP","year":"2018","author":"Han Xueyuan","key":"e_1_3_2_1_19_1","unstructured":"Xueyuan Han, Thomas Pasquier, and Margo Seltzer. 2018. Provenance-based intrusion detection: opportunities and challenges. In 10th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2018)."},{"volume-title":"USENIX Security Symposium. 2345\u20132362","year":"2021","author":"Han Xueyuan","key":"e_1_3_2_1_20_1","unstructured":"Xueyuan Han, Xiao Yu, Thomas FJ-M Pasquier, Ding Li, Junghwan Rhee, James\u00a0W Mickens, Margo\u00a0I Seltzer, and Haifeng Chen. 2021. SIGL: Securing Software Installations Through Deep Graph Learning.. In USENIX Security Symposium. 2345\u20132362."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i14.17533"},{"volume-title":"Long short-term memory. Neural computation 9, 8","year":"1997","author":"Hochreiter Sepp","key":"e_1_3_2_1_22_1","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735\u20131780."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.267"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-022-00910-3"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA52953.2021.00273"},{"volume-title":"International Conference on Learning Representations.","year":"2018","author":"Karras Tero","key":"e_1_3_2_1_26_1","unstructured":"Tero Karras, Timo Aila, Samuli Laine, and Jaakko Lehtinen. 2018. Progressive Growing of GANs for Improved Quality, Stability, and Variation. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_27_1","unstructured":"Angelos\u00a0D. Keromytis. [n. d.]. Transparent-Computing: Material from the DARPA Transparent Computing Program. https:\/\/github.com\/darpa-i2o\/Transparent-Computing. (Accessed on 10\/06\/2022)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107183"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24107"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047915.1047918"},{"volume-title":"International Conference on Learning Representations (ICLR)","year":"2016","author":"Kipf N","key":"e_1_3_2_1_31_1","unstructured":"Thomas\u00a0N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. International Conference on Learning Representations (ICLR) (2016)."},{"volume-title":"Reformer: The Efficient Transformer. In International Conference on Learning Representations.","year":"2019","author":"Kitaev Nikita","key":"e_1_3_2_1_32_1","unstructured":"Nikita Kitaev, Lukasz Kaiser, and Anselm Levskaya. 2019. Reformer: The Efficient Transformer. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_33_1","first-page":"12","article-title":"A reduction of a graph to a canonical form and an algebra arising during this reduction","volume":"2","author":"Leman AA","year":"1968","unstructured":"AA Leman and Boris Weisfeiler. 1968. A reduction of a graph to a canonical form and an algebra arising during this reduction. Nauchno-Technicheskaya Informatsiya 2, 9 (1968), 12\u201316.","journal-title":"Nauchno-Technicheskaya Informatsiya"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30490-4_56"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3130234"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363224"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.09.014"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2870151"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939783"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS54544.2021.00014"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427272"},{"volume-title":"Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781","year":"2013","author":"Mikolov Tomas","key":"e_1_3_2_1_43_1","unstructured":"Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00026"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139923.3139928"},{"volume-title":"UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In 2015 military communications and information systems conference (MilCIS)","author":"Moustafa Nour","key":"e_1_3_2_1_46_1","unstructured":"Nour Moustafa and Jill Slay. 2015. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In 2015 military communications and information systems conference (MilCIS). IEEE, 1\u20136."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220022"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2019.00028"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-021-10456-3"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20133738"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00049"},{"key":"e_1_3_2_1_52_1","unstructured":"Sergey Poznyakoff. 2022. GDBM. https:\/\/www.gnu.org.ua\/software\/gdbm\/. (Accessed on 07\/18\/2022)."},{"volume-title":"Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434","year":"2015","author":"Radford Alec","key":"e_1_3_2_1_53_1","unstructured":"Alec Radford, Luke Metz, and Soumith Chintala. 2015. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434 (2015)."},{"volume-title":"Temporal Graph Networks for Deep Learning on Dynamic Graphs. arXiv:2006.10637 [cs, stat] (Oct","year":"2020","author":"Rossi Emanuele","key":"e_1_3_2_1_54_1","unstructured":"Emanuele Rossi, Ben Chamberlain, Fabrizio Frasca, Davide Eynard, Federico Monti, and Michael Bronstein. 2020. Temporal Graph Networks for Deep Learning on Dynamic Graphs. arXiv:2006.10637 [cs, stat] (Oct. 2020). http:\/\/arxiv.org\/abs\/2006.10637 arXiv:2006.10637."},{"volume-title":"Electronics & Mobile Communication Conference (UEMCON). IEEE, 683\u2013687","year":"2018","author":"Salem Milad","key":"e_1_3_2_1_55_1","unstructured":"Milad Salem, Shayan Taheri, and Jiann\u00a0Shiun Yuan. 2018. Anomaly generation using generative adversarial networks in host-based intrusion detection. In 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 683\u2013687."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243829"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"volume-title":"Attention is all you need. Advances in neural information processing systems 30","year":"2017","author":"Vaswani Ashish","key":"e_1_3_2_1_58_1","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan\u00a0N Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in neural information processing systems 30 (2017)."},{"volume-title":"International Conference on Learning Representations (ICLR)","year":"2018","author":"Veli\u010dkovi\u0107 Petar","key":"e_1_3_2_1_59_1","unstructured":"Petar Veli\u010dkovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2018. Graph attention networks. International Conference on Learning Representations (ICLR) (2018)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Qi Wang Wajih\u00a0Ul Hassan Ding Li Kangkook Jee Xiao Yu Kexuan Zou Junghwan Rhee Zhengzhang Chen Wei Cheng Carl\u00a0A Gunter 2020. You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.. In NDSS.","DOI":"10.14722\/ndss.2020.24167"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3208815"},{"volume-title":"Inductive Representation Learning on Temporal Graphs. ICLR (Feb","year":"2020","author":"Xu Da","key":"e_1_3_2_1_62_1","unstructured":"Da Xu, Chuanwei Ruan, Evren Korpeoglu, Sushant Kumar, and Kannan Achan. 2020. Inductive Representation Learning on Temporal Graphs. ICLR (Feb. 2020). http:\/\/arxiv.org\/abs\/2002.07962 arXiv:2002.07962."},{"volume-title":"How powerful are graph neural networks?International Conference on Learning Representations (ICLR)","year":"2018","author":"Xu Keyulu","key":"e_1_3_2_1_63_1","unstructured":"Keyulu Xu, Weihua Hu, Jure Leskovec, and Stefanie Jegelka. 2018. How powerful are graph neural networks?International Conference on Learning Representations (ICLR) (2018)."},{"volume-title":"International conference on machine learning. PMLR, 5453\u20135462","year":"2018","author":"Xu Keyulu","key":"e_1_3_2_1_64_1","unstructured":"Keyulu Xu, Chengtao Li, Yonglong Tian, Tomohiro Sonobe, Ken-ichi Kawarabayashi, and Stefanie Jegelka. 2018. Representation learning on graphs with jumping knowledge networks. In International conference on machine learning. PMLR, 5453\u20135462."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2010.55"},{"volume-title":"Poirot: Causal correlation aided semantic analysis for advanced persistent threat detection","year":"2021","author":"Yang Jian","key":"e_1_3_2_1_66_1","unstructured":"Jian Yang, Qi Zhang, Xiaofeng Jiang, Shuangwu Chen, and Feng Yang. 2021. Poirot: Causal correlation aided semantic analysis for advanced persistent threat detection. IEEE Transactions on Dependable and Secure Computing (2021)."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833669"},{"volume-title":"International Conference on Machine Learning. PMLR, 11365\u201311375","year":"2020","author":"Zhao Jingyu","key":"e_1_3_2_1_68_1","unstructured":"Jingyu Zhao, Feiqing Huang, Jia Lv, Yanjie Duan, Zhen Qin, Guodong Li, and Guangjian Tian. 2020. Do rnn and lstm have long memory?. In International Conference on Machine Learning. PMLR, 11365\u201311375."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01267-0_40"},{"volume-title":"Provenance-based Intrusion Detection Systems: A Survey. ACM Computing Surveys (CSUR)","year":"2022","author":"Zipperle Michael","key":"e_1_3_2_1_70_1","unstructured":"Michael Zipperle, Florian Gottwalt, Elizabeth Chang, and Tharam Dillon. 2022. Provenance-based Intrusion Detection Systems: A Survey. ACM Computing Surveys (CSUR) (2022)."}],"event":{"name":"RAID 2023: The 26th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID 2023","location":"Hong Kong China"},"container-title":["Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607199.3607201","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T10:29:05Z","timestamp":1729074545000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607199.3607201"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":70,"alternative-id":["10.1145\/3607199.3607201","10.1145\/3607199"],"URL":"https:\/\/doi.org\/10.1145\/3607199.3607201","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}