Exploring Answer Set Programming for Provenance Graph-Based Cyber Threat Detection: A Novel Approach
This program is tentative and subject to change.
Provenance graphs are powerful tools for representing system-level activities in cybersecurity, but existing approaches often struggle with complex queries and flexible reasoning. This paper presents a novel approach using Answer Set Programming (ASP) to model and analyze provenance graphs. We introduce an ASP-based representation that captures intricate relationships between system entities, including temporal and causal dependencies. Our model enables sophisticated analysis capabilities such as attack path tracing, data exfiltration detection, and anomaly identification. The declarative nature of ASP allows for concise expression of complex security patterns and policies, facilitating both real-time threat detection and forensic analysis. We demonstrate our approach’s effectiveness through case studies showcasing its threat detection capabilities. Experimental results illustrate the model’s ability to handle large-scale provenance graphs while providing expressive querying. The model’s extensibility allows for incorporation of new system behaviors and security rules, adapting to evolving cyber threats. This work contributes a powerful, flexible, and explainable framework for reasoning about system behaviors and security incidents, advancing the development of effective threat detection and forensic investigation tools.
This program is tentative and subject to change.
Tue 21 JanDisplayed time zone: Mountain Time (US & Canada) change
14:00 - 15:30 | |||
14:00 30mTalk | Exploring Answer Set Programming for Provenance Graph-Based Cyber Threat Detection: A Novel Approach PADL | ||
14:30 30mTalk | Leveraging LLM Reasoning with Dual Horn Programs PADL Paul Tarau University of North Texas | ||
15:00 30mTalk | Enhancing network diagnosis with reflection in Prolog (extended abstract) PADL Anduo Wang Temple University, USA Pre-print |