Research Article
LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering
Table 4
Clustering result of some scenarios.
| | Scenario | Min distance | Number of graphs | Accuracy (%) |
| | OceanLotus [37] | 11.468 | 1 | 100 | | APT28 [38] | 10.734 | 1 | 100 | | Kimsuky [39] | 9.278 | 1 | 100 | | Unknown attack 1 | 3.136 | 1 | 100 | | Unknown attack 2 | 5.121 | 1 | 100 | | Cyber weapons | 4.257 | 2 | 100 | | Check mails | 0.594 | 483 | 72.3 |
|
|