Research Article

LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering

Figure 7

2D visualization of mutual reachability distance and outliers indicate threat BPGs.