Research Article
LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering
Table 3
Attribute information of the above three datasets.
| Datasets | Size (GB) | Logs | Graphs | Attack | Benign |
| Malicious dataset | 10.3 | 8,796,458 | 7 | 1867 | CADETS | 35.7 | 44,404,339 | 4 | 1683 | Benign dataset | 15.6 | 13,446,341 | 0 | 2453 |
|
|