Research Article

LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering

Table 6

Logkernel performance overhead.

DatasetsAttack casesSize on disk (GB)BPGs construction timeGraphs sizeSearch time (s)
Nodes (K)Edges (K)Size (MB)

DAPRA CADETScadets_111.125 min 28 s133.1295.657.6134.24
cadets_217.740 min 53 s171.1408.378.5
cadets_36.7719 min 47 s94.9171.935.2

Malicious dataset10.322 min 19 s106.2183.642.994.62