Research Article

LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering

Table 5

Hunting results on malicious dataset and CADETS dataset.

DatasetGraph kernelGraph typeRecall (%)Precision (%)F-score (%)

Malicious datasetBPG kernelBPGs100100100
No label graphs57.157.172.7
Attribute label graphs10043.860.9
WL kernel [27, 41]BPGs85.75063.2
MPGK AA [28]42.93035.3

CADETS datasetBPG kernelBPGs100100100
No label graphs252022.2
Attribute label graphs1005066
WL kernelBPGs7542.954.6
MPGK AA5033.340