Research Article

LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering

Figure 3

Two different behavior provenance graphs. Checking mail is a normal behavior and word macro virus is a threat behavior.