A Survey of Network Attack Investigation Based on Provenance Graph

被引:0
|
作者
Qiu, Jing [1 ,2 ]
Chen, Rong-Rong [1 ]
Zhu, Hao-Jin [3 ]
Xiao, Yan-Jun [4 ]
Yin, Li-Hua [1 ]
Tian, Zhi-Hong [1 ]
机构
[1] Cyberspace Institute of Advanced Technology, Guangzhou University, Guangdong, Guangzhou,510555, China
[2] Pengcheng Laboratory, Guangdong, Shenzhen,518000, China
[3] Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai,200240, China
[4] NSFOCUS Technologies Group Co., Ltd, Beijing, Guangzhou,100089, China
来源
基金
中国国家自然科学基金;
关键词
Associative processing - Deep learning - Network theory (graphs);
D O I
10.12263/DZXB.20231057
中图分类号
学科分类号
摘要
Investigating network attacks is crucial for the implementation of proactive defenses and the formulation of tracing countermeasures. With the rise of sophisticated and stealthy network threats, the need to develop efficient and automated methods for investigations has become a pivotal aspect of advance intelligent network attack and defense capabilities. Existing studies have focused on modeling system audit logs into provenance graphs that represent causal dependencies of attack events. Leveraging the powerful associative analysis and semantic representation capabilities of provenance graphs, complex and stealthy network attacks can be effectively investigated, yielding superior results compared to conventional methods. This paper offers a systematic review of the literature on provenance-graph-based attack investigation, categorizing the diverse methodologies into three principal groups: causality analysis, deep representation learning, and anomaly detection. For each category, the paper succinctly presents the workflows and the core frameworks that underpin these methodologies. Additionally, it delves into the optimization techniques for provenance graphs and chronicles the evolution of these technologies from theoretical constructs to their application in industrial settings. This study methodically aggregates and reviews datasets prevalently utilized in attack investigation research, offering a comprehensive comparative analysis of representative techniques alongside their associated performance metrics, specifically within the ambit of provenance graph-based methodologies. Subsequently, it delineates the prospective directions for future research and development within this specialized field, thereby providing a structured roadmap for advancing the domain's academic and practical applications. © 2024 Chinese Institute of Electronics. All rights reserved.
引用
收藏
页码:2529 / 2556
相关论文
共 50 条
  • [41] Naggen: a Network Attack Graph GENeration Tool
    Barrere, Martin
    Lupu, Emil C.
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 378 - 379
  • [42] Practical attack graph generation for network defense
    Ingols, Kyle
    Lippmann, Richard
    Piwowarski, Keith
    22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 121 - +
  • [43] Generation and Risk Analysis of Network Attack Graph
    Prasad, Keshav
    Kumar, Santosh
    Negi, Anuradha
    Mahanti, Aniket
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 507 - 516
  • [44] Survey on Graph Neural Network
    Ma S.
    Liu J.
    Zuo X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (01): : 47 - 80
  • [46] Network Security Risk Assessment Method Based on HMM and Attack Graph Model
    Liu Si-chao
    Liu Yuan
    2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2016, : 517 - 522
  • [47] Research on Network Dynamic Threat Analysis Technology Based on Attribute Attack Graph
    Yang Yingjie
    Leng Qiang
    Chang Dexian
    Pan Ruixuan
    Hu Hao
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (08) : 1838 - 1846
  • [48] Network Security Risk Assessment System Based on Attack Graph and Markov Chain
    Sun, Fuxiong
    Pi, Juntao
    Lv, Jin
    Cao, Tian
    2017 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING (CTCE2017), 2017, 910
  • [49] A Component-Centric Access Graph Based Approach to Network Attack Analysis
    Xiao, Xiaochun
    Zhang, Tiange
    Wang, Huan
    Zhang, Gendu
    2008 INTERNATIONAL SEMINAR ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, PROCEEDINGS, 2008, : 171 - 176
  • [50] Extending Attack Graph-Based Metrics for Enterprise Network Security Management
    Bopche, Ghanshyam S.
    Mehtre, Babu M.
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 315 - 325