APTHunter: Detecting Advanced Persistent Threats in Early Stages

被引:3
|
作者
Mahmoud, Moustafa [1 ]
Mannan, Mohammad [1 ]
Youssef, Amr [1 ]
机构
[1] Concordia Univ, Montreal, PQ, Canada
来源
关键词
Threat intelligence; APT; attack detection;
D O I
10.1145/3559768
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose APTHunter, a system for prompt detection of Advanced and Persistent Threats (APTs) in early stages. We provide an approach for representing the indicators of compromise that appear in the cyber threat intelligence reports and the relationships among them as provenance queries that capture the attacker's malicious behavior. We use the kernel audit log as a reliable source for system activities and develop an optimized whole system provenance graph that provides the causal relationships and information flows among system entities in a compact format. Then, we model the threat hunting as a behavior match problem by applying provenance queries to the optimized provenance graph to find any hits as indicators of an APT attack. We evaluate APTHunter on adversarial engagements from DARPA over different OS platforms, as well as real-world APT campaigns. Based on our experimental results, APTHunter promptly and reliably detects attack artifacts in early stages.
引用
收藏
页数:31
相关论文
共 50 条
  • [31] Exploring the vulnerability in the inference phase of advanced persistent threats
    Wu, Qi
    Li, Qiang
    Guo, Dong
    Meng, Xiangyu
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (03)
  • [32] Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats
    Baksi, Rudra P.
    Upadhyaya, Shambhu J.
    [J]. INFORMATION SYSTEMS FRONTIERS, 2021, 23 (04) : 897 - 913
  • [33] Are Software Updates Useless against Advanced Persistent Threats?
    Massacci, Fabio
    Di Tizio, Giorgio
    [J]. COMMUNICATIONS OF THE ACM, 2023, 66 (01) : 31 - 33
  • [34] Preventing Advanced Persistent Threats in Complex Control Networks
    Rubio, Juan E.
    Alcaraz, Cristina
    Lopez, Javier
    [J]. COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 402 - 418
  • [35] Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats
    Rudra P. Baksi
    Shambhu J. Upadhyaya
    [J]. Information Systems Frontiers, 2021, 23 : 897 - 913
  • [36] Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective
    Nicho, Mathew
    Khan, Shafaq
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2014, 8 (01) : 1 - 18
  • [37] Hybrid Analysis Technique to detect Advanced Persistent Threats
    Chakkaravarthy, S. Sibi
    Vaidehi, V.
    Rajesh, P.
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT INFORMATION TECHNOLOGIES, 2018, 14 (02) : 59 - 76
  • [38] Advanced Persistent threats and how to monitor and deter them
    Tankard, Colin
    [J]. Network Security, 2011, 2011 (08) : 16 - 19
  • [39] An adaptive defense mechanism to prevent advanced persistent threats
    Xie, Yi-xi
    Ji, Li-xin
    Li, Ling-shu
    Guo, Zehua
    Baker, Thar
    [J]. CONNECTION SCIENCE, 2021, 33 (02) : 359 - 379
  • [40] Developing Secure Products in the Age of Advanced Persistent Threats
    Baize, Eric
    [J]. IEEE SECURITY & PRIVACY, 2012, 10 (03) : 88 - 92