Research Article

SR2APT: A Detection and Strategic Alert Response Model against Multistage APT Attacks

Figure 1

Provenance graph of a sample trace of system logs. Nodes represent system entities. Arrows and labels on edges indicate the direction and type of relations between entities.