Research Article
LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering
Table 4
Clustering result of some scenarios.
| Scenario | Min distance | Number of graphs | Accuracy (%) |
| OceanLotus [37] | 11.468 | 1 | 100 | APT28 [38] | 10.734 | 1 | 100 | Kimsuky [39] | 9.278 | 1 | 100 | Unknown attack 1 | 3.136 | 1 | 100 | Unknown attack 2 | 5.121 | 1 | 100 | Cyber weapons | 4.257 | 2 | 100 | Check mails | 0.594 | 483 | 72.3 |
|
|