{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:12:36Z","timestamp":1750219956212,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T00:00:00Z","timestamp":1665964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Natural Science Foundation","award":["CCF-2046953, CNS-2028748, OAC-2104007"],"award-info":[{"award-number":["CCF-2046953, CNS-2028748, OAC-2104007"]}]},{"name":"DOE-NNSA-LLNS","award":["B647887"],"award-info":[{"award-number":["B647887"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,17]]},"DOI":"10.1145\/3511808.3557185","type":"proceedings-article","created":{"date-parts":[[2022,10,16]],"date-time":"2022-10-16T01:29:57Z","timestamp":1665883797000},"page":"4872-4876","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["System-Auditing, Data Analysis and Characteristics of Cyber Attacks for Big Data Systems"],"prefix":"10.1145","author":[{"given":"Liangyi","family":"Huang","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Sophia","family":"Hall","sequence":"additional","affiliation":[{"name":"Case Western Reserve University, Cleveland, OH, USA"}]},{"given":"Fei","family":"Shao","sequence":"additional","affiliation":[{"name":"Case Western Reserve University, Cleveland, OH, USA"}]},{"given":"Arafath","family":"Nihar","sequence":"additional","affiliation":[{"name":"Case Western Reserve University, Cleveland, OH, USA"}]},{"given":"Vipin","family":"Chaudhary","sequence":"additional","affiliation":[{"name":"Case Western Reserve University, Cleveland, OH, USA"}]},{"given":"Yinghui","family":"Wu","sequence":"additional","affiliation":[{"name":"Case Western Reserve University, Cleveland, OH, USA"}]},{"given":"Roger","family":"French","sequence":"additional","affiliation":[{"name":"Case Western Reserve University, Cleveland, OH, USA"}]},{"given":"Xusheng","family":"Xiao","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,10,17]]},"reference":[{"unstructured":"2021. DepImpact Project Website. https:\/\/github.com\/usenixsub\/DepImpact.  2021. DepImpact Project Website. https:\/\/github.com\/usenixsub\/DepImpact.","key":"e_1_3_2_2_1_1"},{"unstructured":"2022. Apache Spark? - Unified Engine for Large-Scale Data Analytics. https:\/\/spark.apache.org\/.  2022. Apache Spark? - Unified Engine for Large-Scale Data Analytics. https:\/\/spark.apache.org\/.","key":"e_1_3_2_2_2_1"},{"unstructured":"2022. Cloudera Data Platform (CDP). https:\/\/www.cloudera.com\/products\/clouderadata-platform.html.  2022. Cloudera Data Platform (CDP). https:\/\/www.cloudera.com\/products\/clouderadata-platform.html.","key":"e_1_3_2_2_3_1"},{"unstructured":"Apache Software Foundation. 2022. Hadoop. https:\/\/hadoop.apache.org.  Apache Software Foundation. 2022. Hadoop. https:\/\/hadoop.apache.org.","key":"e_1_3_2_2_4_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_5_1","DOI":"10.1145\/1095810.1095826"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_6_1","DOI":"10.14722\/ndss.2019.23349"},{"unstructured":"HBase. 2022. Apache HBase. https:\/\/hbase.apache.org\/.  HBase. 2022. Apache HBase. https:\/\/hbase.apache.org\/.","key":"e_1_3_2_2_7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_8_1","DOI":"10.1080\/17512549.2020.1730239"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_9_1","DOI":"10.1109\/JPHOTOV.2016.2626919"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_10_1","DOI":"10.1609\/aaai.v35i17.17799"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_11_1","DOI":"10.1371\/journal.pone.0240461"},{"volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). 89--104","author":"Kim Taesoo","unstructured":"Taesoo Kim , Xi Wang , Nickolai Zeldovich , and M. Frans Kaashoek . 2010. Intrusion Recovery Using Selective Re-execution . In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). 89--104 . Taesoo Kim, Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek. 2010. Intrusion Recovery Using Selective Re-execution. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). 89--104.","key":"e_1_3_2_2_12_1"},{"volume-title":"Proceedings of the ACM Symposium on Operating systems principles (SOSP). ACM, 223--236","author":"Samuel","unstructured":"Samuel T. King and Peter M. Chen. 2003. Backtracking intrusions . In Proceedings of the ACM Symposium on Operating systems principles (SOSP). ACM, 223--236 . Samuel T. King and Peter M. Chen. 2003. Backtracking intrusions. In Proceedings of the ACM Symposium on Operating systems principles (SOSP). ACM, 223--236.","key":"e_1_3_2_2_13_1"},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS).","author":"King Samuel T.","unstructured":"Samuel T. King , Zhuoqing Morley Mao , Dominic G. Lucchetti , and Peter M. Chen . 2005. Enriching Intrusion Alerts Through Multi-Host Causality . In Proceedings of the Network and Distributed System Security Symposium (NDSS). Samuel T. King, Zhuoqing Morley Mao, Dominic G. Lucchetti, and Peter M. Chen. 2005. Enriching Intrusion Alerts Through Multi-Host Causality. In Proceedings of the Network and Distributed System Security Symposium (NDSS).","key":"e_1_3_2_2_14_1"},{"key":"e_1_3_2_2_15_1","volume-title":"French","author":"Liu Jiqi","year":"2021","unstructured":"Jiqi Liu , Menghong Wang , Alan J. Curran , Erdmut Schnabel , Michael K\u00f6hl , Jennifer L. Braid , and Roger H . French . 2021 . Degradation Mechanisms and Partial Shading of Glass-Backsheet and Double-Glass Photovoltaic Modules in Three Climate Zones Determined by Remote Monitoring of Time-Series Current--Voltage and Power Datastreams. Solar Energy 224 (Aug. 2021), 1291--1301. https:\/\/doi.org\/10.1016\/j.solener.2021.06.022 10.1016\/j.solener.2021.06.022 Jiqi Liu, Menghong Wang, Alan J. Curran, Erdmut Schnabel, Michael K\u00f6hl, Jennifer L. Braid, and Roger H. French. 2021. Degradation Mechanisms and Partial Shading of Glass-Backsheet and Double-Glass Photovoltaic Modules in Three Climate Zones Determined by Remote Monitoring of Time-Series Current--Voltage and Power Datastreams. Solar Energy 224 (Aug. 2021), 1291--1301. https:\/\/doi.org\/10.1016\/j.solener.2021.06.022"},{"key":"e_1_3_2_2_16_1","volume-title":"Watchdog: Filesystem Events Monitoring. https:\/\/github.com\/gorakhargosh\/watchdog.","author":"Mangalapilly Yesudeep","year":"2014","unstructured":"Yesudeep Mangalapilly . 2014 . Watchdog: Filesystem Events Monitoring. https:\/\/github.com\/gorakhargosh\/watchdog. Yesudeep Mangalapilly. 2014. Watchdog: Filesystem Events Monitoring. https:\/\/github.com\/gorakhargosh\/watchdog."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_17_1","DOI":"10.1145\/3363554"},{"unstructured":"Sysdig. 2017. Sysdig. https:\/\/sysdig.com\/.  Sysdig. 2017. Sysdig. https:\/\/sysdig.com\/.","key":"e_1_3_2_2_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_19_1","DOI":"10.1145\/3243734.3243763"},{"key":"e_1_3_2_2_20_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP)","author":"Xu Zhiqiang","year":"2021","unstructured":"Zhiqiang Xu , Pengcheng Fang , Changlin Liu Liu , Xusheng Xiao , Yu Wen , and Dan Meng . 2021 . DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation . In Proceedings of the IEEE Symposium on Security and Privacy (SP) , San Francisco, CA. 22--26. Zhiqiang Xu, Pengcheng Fang, Changlin Liu Liu, Xusheng Xiao, Yu Wen, and Dan Meng. 2021. DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation. In Proceedings of the IEEE Symposium on Security and Privacy (SP), San Francisco, CA. 22--26."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_21_1","DOI":"10.1145\/2976749.2978378"}],"event":{"sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"acronym":"CIKM '22","name":"CIKM '22: The 31st ACM International Conference on Information and Knowledge Management","location":"Atlanta GA USA"},"container-title":["Proceedings of the 31st ACM International Conference on Information &amp; Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511808.3557185","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3511808.3557185","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:06Z","timestamp":1750182546000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511808.3557185"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,17]]},"references-count":21,"alternative-id":["10.1145\/3511808.3557185","10.1145\/3511808"],"URL":"https:\/\/doi.org\/10.1145\/3511808.3557185","relation":{},"subject":[],"published":{"date-parts":[[2022,10,17]]},"assertion":[{"value":"2022-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}