Research Article

LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering

Table 3

Attribute information of the above three datasets.

DatasetsSize (GB)LogsGraphs
AttackBenign

Malicious dataset10.38,796,45871867
CADETS35.744,404,33941683
Benign dataset15.613,446,34102453