Research Article

LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering

Table 4

Clustering result of some scenarios.

ScenarioMin distanceNumber of graphsAccuracy (%)

OceanLotus [37]11.4681100
APT28 [38]10.7341100
Kimsuky [39]9.2781100
Unknown attack 13.1361100
Unknown attack 25.1211100
Cyber weapons4.2572100
Check mails0.59448372.3