A Survey of Network Attack Investigation Based on Provenance Graph

被引:0
|
作者
Qiu, Jing [1 ,2 ]
Chen, Rong-Rong [1 ]
Zhu, Hao-Jin [3 ]
Xiao, Yan-Jun [4 ]
Yin, Li-Hua [1 ]
Tian, Zhi-Hong [1 ]
机构
[1] Cyberspace Institute of Advanced Technology, Guangzhou University, Guangdong, Guangzhou,510555, China
[2] Pengcheng Laboratory, Guangdong, Shenzhen,518000, China
[3] Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai,200240, China
[4] NSFOCUS Technologies Group Co., Ltd, Beijing, Guangzhou,100089, China
来源
基金
中国国家自然科学基金;
关键词
Associative processing - Deep learning - Network theory (graphs);
D O I
10.12263/DZXB.20231057
中图分类号
学科分类号
摘要
Investigating network attacks is crucial for the implementation of proactive defenses and the formulation of tracing countermeasures. With the rise of sophisticated and stealthy network threats, the need to develop efficient and automated methods for investigations has become a pivotal aspect of advance intelligent network attack and defense capabilities. Existing studies have focused on modeling system audit logs into provenance graphs that represent causal dependencies of attack events. Leveraging the powerful associative analysis and semantic representation capabilities of provenance graphs, complex and stealthy network attacks can be effectively investigated, yielding superior results compared to conventional methods. This paper offers a systematic review of the literature on provenance-graph-based attack investigation, categorizing the diverse methodologies into three principal groups: causality analysis, deep representation learning, and anomaly detection. For each category, the paper succinctly presents the workflows and the core frameworks that underpin these methodologies. Additionally, it delves into the optimization techniques for provenance graphs and chronicles the evolution of these technologies from theoretical constructs to their application in industrial settings. This study methodically aggregates and reviews datasets prevalently utilized in attack investigation research, offering a comprehensive comparative analysis of representative techniques alongside their associated performance metrics, specifically within the ambit of provenance graph-based methodologies. Subsequently, it delineates the prospective directions for future research and development within this specialized field, thereby providing a structured roadmap for advancing the domain's academic and practical applications. © 2024 Chinese Institute of Electronics. All rights reserved.
引用
收藏
页码:2529 / 2556
相关论文
共 50 条
  • [1] TRACEGADGET: Detecting and Tracing Network Level Attack Through Federal Provenance Graph
    Liu, Han
    Wang, Yuntao
    Su, Zhou
    Wang, Zixuan
    Pan, Yanghe
    Li, Ruidong
    ICC 2024 - IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2024, : 2713 - 2718
  • [2] Research on computer network attack modeling based on attack graph
    Wang, Guo-Yu
    Wang, Hui-Mei
    Chen, Zhi-Jie
    Xian, Ming
    Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2009, 31 (04): : 74 - 80
  • [3] Network Vulnerability Assessment based on Attack Graph
    Wang Huan
    Zhao Jianping
    Liu Dan
    Li Bo
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC), 2017, : 542 - 545
  • [4] Attack graph based evaluation of network security
    Kotenko, Igor
    Stepashkin, Mikhail
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 216 - 227
  • [5] ProvGRP: A Context-Aware Provenance Graph Reduction and Partition Approach for Facilitating Attack Investigation
    Li, Jiawei
    Zhang, Ru
    Liu, Jianyi
    ELECTRONICS, 2024, 13 (01)
  • [6] Graph neural network based on graph kernel: A survey
    Xu, Lixiang
    Peng, Jiawang
    Jiang, Xiaoyi
    Chen, Enhong
    Luo, Bin
    PATTERN RECOGNITION, 2025, 161
  • [7] Network Security Risk Assessment Based on Attack Graph
    Xie, Lixia
    Zhang, Xiao
    Zhang, Jiyong
    JOURNAL OF COMPUTERS, 2013, 8 (09) : 2339 - 2347
  • [8] A Method Based on Global Attack Graph for Network Hardening
    Man, Dapeng
    Yang, Wu
    Yang, Yongtian
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4536 - 4539
  • [9] Heuristic Network Security Risk Based on Attack Graph
    Sun, Wei
    Li, Qianmu
    Wang, Pengchuan
    Hou, Jun
    CLOUD COMPUTING, CLOUDCOMP 2021, 2022, 430 : 181 - 194
  • [10] Network Attack Identification and Analysis Based on Graph Convolutional Neural Network
    Wang, Xingyu
    Wenkun
    Zhang, Yingdan
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1443 - 1448