Research Article
LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering
Figure 2
The provenance graph for the macro viruses attack scenario. Rectangles represent processes, diamonds represent IPs, and rounded rectangles represent files.