Research Article

LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering

Table 1

Entity types and relationships.

Start nodeEnd nodeRelationships

ProcessFileRead; write; execute
IPConnect
ProcessCreate

IPUserLogon

UserProcessExecute