A Survey of Network Attack Investigation Based on Provenance Graph

被引:0
|
作者
Qiu, Jing [1 ,2 ]
Chen, Rong-Rong [1 ]
Zhu, Hao-Jin [3 ]
Xiao, Yan-Jun [4 ]
Yin, Li-Hua [1 ]
Tian, Zhi-Hong [1 ]
机构
[1] Cyberspace Institute of Advanced Technology, Guangzhou University, Guangdong, Guangzhou,510555, China
[2] Pengcheng Laboratory, Guangdong, Shenzhen,518000, China
[3] Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai,200240, China
[4] NSFOCUS Technologies Group Co., Ltd, Beijing, Guangzhou,100089, China
来源
基金
中国国家自然科学基金;
关键词
Associative processing - Deep learning - Network theory (graphs);
D O I
10.12263/DZXB.20231057
中图分类号
学科分类号
摘要
Investigating network attacks is crucial for the implementation of proactive defenses and the formulation of tracing countermeasures. With the rise of sophisticated and stealthy network threats, the need to develop efficient and automated methods for investigations has become a pivotal aspect of advance intelligent network attack and defense capabilities. Existing studies have focused on modeling system audit logs into provenance graphs that represent causal dependencies of attack events. Leveraging the powerful associative analysis and semantic representation capabilities of provenance graphs, complex and stealthy network attacks can be effectively investigated, yielding superior results compared to conventional methods. This paper offers a systematic review of the literature on provenance-graph-based attack investigation, categorizing the diverse methodologies into three principal groups: causality analysis, deep representation learning, and anomaly detection. For each category, the paper succinctly presents the workflows and the core frameworks that underpin these methodologies. Additionally, it delves into the optimization techniques for provenance graphs and chronicles the evolution of these technologies from theoretical constructs to their application in industrial settings. This study methodically aggregates and reviews datasets prevalently utilized in attack investigation research, offering a comprehensive comparative analysis of representative techniques alongside their associated performance metrics, specifically within the ambit of provenance graph-based methodologies. Subsequently, it delineates the prospective directions for future research and development within this specialized field, thereby providing a structured roadmap for advancing the domain's academic and practical applications. © 2024 Chinese Institute of Electronics. All rights reserved.
引用
收藏
页码:2529 / 2556
相关论文
共 50 条
  • [31] Analysis of Attack Graph-based Metrics for Quantification of Network Security
    Kundu, Arkadeep
    Ghosh, Nirnay
    Chokshi, Ishan
    Ghosh, Soumya K.
    2012 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2012, : 530 - 535
  • [32] Computer network security evaluation method based on improved attack graph
    Li, Zhaocui
    Liu, Huichuan
    Wu, Chunyan
    Journal of Cyber Security Technology, 2022, 6 (04) : 201 - 215
  • [33] Evaluation of Network Risk Using Attack Graph Based Security Metrics
    Kumar, Santosh
    Negi, Anuradha
    Prasad, Keshav
    Mahanti, Aniket
    2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 91 - 93
  • [34] An attack graph-based probabilistic computing approach of network security
    Ye Y.
    Xu X.-S.
    Jia Y.
    Qi Z.-C.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (10): : 1987 - 1996
  • [35] Algorithm of generating host-based attack graph for overall network
    Zhong S.
    Xu G.
    Yang Y.
    Yao W.
    Yang Y.
    Advances in Information Sciences and Service Sciences, 2011, 3 (08): : 104 - 110
  • [36] Adversarial Attack and Defense on Graph Data: A Survey
    Sun, Lichao
    Dou, Yingtong
    Yang, Carl
    Zhang, Kai
    Wang, Ji
    Yu, Philip S.
    He, Lifang
    Li, Bo
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (08) : 7693 - 7711
  • [37] A network attack path prediction method using attack graph
    Liu, Xuguang
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020,
  • [38] A fast all-packets-based DDoS attack detection approach based on network graph and graph kernel
    Liu, Xinqian
    Ren, Jiadong
    He, Haitao
    Zhang, Bing
    Song, Chen
    Wang, Yunxue
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 185
  • [39] CAPT:Context-Aware Provenance Tracing for Attack Investigation
    Cheng Tan
    Lei Zhao
    Weijie Liu
    Lai Xu
    Lina Wang
    中国通信, 2018, 15 (02) : 153 - 169
  • [40] CAPT: Context-Aware Provenance Tracing for Attack Investigation
    Tan, Cheng
    Zhao, Lei
    Liu, Weijie
    Xu, Lai
    Wang, Lina
    CHINA COMMUNICATIONS, 2018, 15 (02) : 153 - 169