Advanced persistent threat detection via mining long-term features in provenance graphs

被引:0
|
作者
Xu, Fan [1 ,2 ]
Zhao, Qinxin [3 ]
Liu, Xiaoxiao [4 ]
Wang, Nan [1 ]
Gao, Meiqi [4 ,5 ,6 ]
Wen, Xuezhi [4 ]
Zhang, Dalin [1 ]
机构
[1] Beijing Jiaotong Univ, Sch Cyberspace Sci & Techonol, Beijing 100044, Peoples R China
[2] Univ Sci & Technol China, Hefei 230026, Peoples R China
[3] Nanjing Univ, Dept Comp Sci & Technol, State Key Lab Novel Software Technol, Nanjing 210023, Peoples R China
[4] Beijing Jiaotong Univ, Sch Software Engn, Beijing 100044, Peoples R China
[5] Jilin Univ, Key Lab Symbol Computat & Knowledge Engn, Minist Educ, Changchun 130012, Peoples R China
[6] Adv Cryptog & Syst Secur Key Lab Sichuan Prov, Chengdu 610000, Peoples R China
基金
中国国家自然科学基金;
关键词
advanced persistent threats; provenance graph; long-term features extraction;
D O I
10.1007/s11704-024-40610-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced Persistent Threats (APTs) pose significant challenges to detect due to their "low-and-slow" attack patterns and frequent use of zero-day vulnerabilities. Within this task, the extraction of long-term features is often crucial. In this work, we propose a novel end-to-end APT detection framework named Long-Term Feature Association Provenance Graph Detector (LT-ProveGD). Specifically, LT-ProveGD encodes contextual information of the dynamic provenance graph while preserving the topological information with space efficiency. To combat "low-and-slow" attacks, LT-ProveGD develops an autoencoder with an integrated multi-head attention mechanism to extract long-term dependencies within the encoded representations. Furthermore, to facilitate the detection of previously unknown attacks, we leverage Jenks' natural breaks methodology, enabling detection without relying on specific attack information. By conducting extensive experiments on five widely used datasets with state-of-the-art attack detection methods, we demonstrate the superior effectiveness of LT-ProveGD.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Advanced Persistent Threat Detection Using Data Provenance and Metric Learning
    Akbar, Khandakar Ashrafi
    Wang, Yigong
    Ayoade, Gbadebo
    Gao, Yang
    Singhal, Anoop
    Khan, Latifur
    Thuraisingham, Bhavani
    Jee, Kangkook
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 3957 - 3969
  • [2] Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning
    Ayoade, Gbadebo
    Akbar, Khandakar Ashrafi
    Sahoo, Pracheta
    Gao, Yang
    Agarwal, Anmol
    Jee, Kangkook
    Khan, Latifur
    Singhal, Anoop
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [3] ANUBIS: A Provenance Graph-Based Framework for Advanced Persistent Threat Detection
    Anjum, Md Monowar
    Iqbal, Shahrear
    Hamelin, Benoit
    37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2022, : 1684 - 1693
  • [4] A baseline for unsupervised advanced persistent threat detection in system-level provenance
    Berrada, Ghita
    Cheney, James
    Benabderrahmane, Sidahmed
    Maxwell, William
    Mookherjee, Himan
    Theriault, Alec
    Wright, Ryan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 : 401 - 413
  • [5] Mining for Long-Term Dependencies in Causal Graphs
    Kourani, Humam
    Di Francescomarino, Chiara
    Ghidini, Chiara
    van der Aalst, Wil
    van Zelst, Sebastiaan
    BUSINESS PROCESS MANAGEMENT WORKSHOPS, BPM 2022 INTERNATIONAL WORKSHOPS, 2023, 460 : 117 - 131
  • [6] Construction of advanced persistent threat attack detection model based on provenance graph and attention mechanism
    Li Y.
    Luo H.
    Wang X.
    Yuan J.
    Tongxin Xuebao/Journal on Communications, 2024, 45 (03): : 117 - 130
  • [7] Advanced Persistent Threat Detection: A Survey
    Khalid, Adam
    Zainal, Anazida
    Maarof, Mohd Aizaini
    Ghaleb, Fuad A.
    2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC), 2021, : 84 - 89
  • [8] An Approach for Detection of Advanced Persistent Threat Attacks
    Zou, Qingtian
    Sun, Xiaoyan
    Liu, Peng
    Singhal, Anoop
    COMPUTER, 2020, 53 (12) : 92 - 96
  • [9] From TTP to IoC: Advanced Persistent Graphs for Threat Hunting
    Berady, Aimad
    Jaume, Mathieu
    Tong, Valerie Viet Triem
    Guette, Gilles
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02): : 1321 - 1333
  • [10] Threat detection and investigation with system-level provenance graphs: A survey
    Li, Zhenyuan
    Chen, Qi Alfred
    Yang, Runqing
    Chen, Yan
    Ruan, Wei
    COMPUTERS & SECURITY, 2021, 106