Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection [arxiv] [code]
To appear in Network and Distributed System Security Symposium 2025 (NDSS'25)
Lingzhi Wang, Xiangmin Shen, Weijian Li, Zhenyuan Li, R. Sekar, Han Liu, Yan Chen
Publications
Publications
Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments [paper] [code]
Published in Proceedings of the 19th ACM Asia Conference on Computer and Communications Security (AsiaCCS'24)
Xiangmin Shen, Zhenyuan Li, Graham Burleigh, Lingzhi Wang, Yan Chen
Root-cause metric location for microservice systems via log anomaly detection [paper]
Published in 2020 IEEE International Conference on Web Services (ICWS'20)
Lingzhi Wang, Nengwen Zhao, Junjie Chen, Pinnong Li, Wenchi Zhang, Kaixin Sui
Working Papers
From Sands to Mansions: Enabling Automatic Full-Life-Cycle Cyberattack Construction with LLM [arxiv]
Lingzhi Wang, Jiahui Wang, Kyle Jung, Kedar Thiagarajan, Emily Wei, Xiangmin Shen, Yan Chen, Zhenyuan Li
Marlin: Knowledge-Driven Analysis of Provenance Graphs for Efficient and Robust Detection of Cyber Attacks [arxiv]
Zhenyuan Li, Yangyang Wei, Xiangmin Shen, Lingzhi Wang, Yan Chen, Haitao Xu, Shouling Ji, Fan Zhang