Research Article

LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering

Figure 2

The provenance graph for the macro viruses attack scenario. Rectangles represent processes, diamonds represent IPs, and rounded rectangles represent files.