A Survey of Network Attack Investigation Based on Provenance Graph

被引:0
|
作者
Qiu, Jing [1 ,2 ]
Chen, Rong-Rong [1 ]
Zhu, Hao-Jin [3 ]
Xiao, Yan-Jun [4 ]
Yin, Li-Hua [1 ]
Tian, Zhi-Hong [1 ]
机构
[1] Cyberspace Institute of Advanced Technology, Guangzhou University, Guangdong, Guangzhou,510555, China
[2] Pengcheng Laboratory, Guangdong, Shenzhen,518000, China
[3] Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai,200240, China
[4] NSFOCUS Technologies Group Co., Ltd, Beijing, Guangzhou,100089, China
来源
基金
中国国家自然科学基金;
关键词
Associative processing - Deep learning - Network theory (graphs);
D O I
10.12263/DZXB.20231057
中图分类号
学科分类号
摘要
Investigating network attacks is crucial for the implementation of proactive defenses and the formulation of tracing countermeasures. With the rise of sophisticated and stealthy network threats, the need to develop efficient and automated methods for investigations has become a pivotal aspect of advance intelligent network attack and defense capabilities. Existing studies have focused on modeling system audit logs into provenance graphs that represent causal dependencies of attack events. Leveraging the powerful associative analysis and semantic representation capabilities of provenance graphs, complex and stealthy network attacks can be effectively investigated, yielding superior results compared to conventional methods. This paper offers a systematic review of the literature on provenance-graph-based attack investigation, categorizing the diverse methodologies into three principal groups: causality analysis, deep representation learning, and anomaly detection. For each category, the paper succinctly presents the workflows and the core frameworks that underpin these methodologies. Additionally, it delves into the optimization techniques for provenance graphs and chronicles the evolution of these technologies from theoretical constructs to their application in industrial settings. This study methodically aggregates and reviews datasets prevalently utilized in attack investigation research, offering a comprehensive comparative analysis of representative techniques alongside their associated performance metrics, specifically within the ambit of provenance graph-based methodologies. Subsequently, it delineates the prospective directions for future research and development within this specialized field, thereby providing a structured roadmap for advancing the domain's academic and practical applications. © 2024 Chinese Institute of Electronics. All rights reserved.
引用
收藏
页码:2529 / 2556
相关论文
共 50 条
  • [21] The Construction and Application of Network Attack Graph
    Wang Yonggang
    Miao Yi
    Yang Yang
    Chen Zhong
    Hu Jianbin
    CHINA COMMUNICATIONS, 2009, 6 (04) : 71 - 74
  • [22] A Review on Network Attack Graph Technology
    Yuan, Bin-tao
    Pan, Zu-lie
    Shi, Fan
    2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 239 - 245
  • [23] A Logic-based Attack Graph for Analyzing Network Security Risk Against Potential Attack
    Yi, Feng
    Cai, Huang Yi
    Xin, Fu Zheng
    2018 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), 2018,
  • [24] Graph Neural Network-Based EEGClassification: A Survey
    Klepl, Dominik
    Wu, Min
    He, Fei
    IEEE TRANSACTIONS ON NEURAL SYSTEMS AND REHABILITATION ENGINEERING, 2024, 32 : 493 - 503
  • [25] Multiobjective network security dynamic assessment method based on Bayesian network attack graph
    Xie, Jialiang
    Zhang, Shanli
    Wang, Honghui
    Chen, Mingzhi
    INTERNATIONAL JOURNAL OF INTELLIGENT COMPUTING AND CYBERNETICS, 2024, 17 (01) : 38 - 60
  • [26] Research on Network Security Quantitative Model Based on Probabilistic Attack Graph
    Cui, Yimin
    Li, Junmei
    Zhao, Wei
    Luan, Cheng
    AMCSE 2018 - INTERNATIONAL CONFERENCE ON APPLIED MATHEMATICS, COMPUTATIONAL SCIENCE AND SYSTEMS ENGINEERING, 2019, 24
  • [27] AGQL: A Query Language for Attack Graph based Network Vulnerability Analysis
    Barik, Mridul Sankar
    PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
  • [28] A survivability quantitative analysis model for network system based on attack graph
    Zhang, Le-Jun
    Wang, Wei
    Guo, Lin
    Yang, Wu
    Yang, Yong-Tian
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3211 - 3216
  • [29] Network intrusion intention analysis model based on Bayesian attack graph
    Luo Z.
    Yang X.
    Liu J.
    Xu R.
    1600, Editorial Board of Journal on Communications (41): : 160 - 169
  • [30] NETWORK ATTACK PATH PREDICTION BASED ON VULNERABILITY DATA AND KNOWLEDGE GRAPH
    Wang, Yifan
    Sun, Zhi
    Han, Ye
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2021, 17 (05): : 1717 - 1730