Advanced persistent threat detection via mining long-term features in provenance graphs

被引:0
|
作者
Xu, Fan [1 ,2 ]
Zhao, Qinxin [3 ]
Liu, Xiaoxiao [4 ]
Wang, Nan [1 ]
Gao, Meiqi [4 ,5 ,6 ]
Wen, Xuezhi [4 ]
Zhang, Dalin [1 ]
机构
[1] Beijing Jiaotong Univ, Sch Cyberspace Sci & Techonol, Beijing 100044, Peoples R China
[2] Univ Sci & Technol China, Hefei 230026, Peoples R China
[3] Nanjing Univ, Dept Comp Sci & Technol, State Key Lab Novel Software Technol, Nanjing 210023, Peoples R China
[4] Beijing Jiaotong Univ, Sch Software Engn, Beijing 100044, Peoples R China
[5] Jilin Univ, Key Lab Symbol Computat & Knowledge Engn, Minist Educ, Changchun 130012, Peoples R China
[6] Adv Cryptog & Syst Secur Key Lab Sichuan Prov, Chengdu 610000, Peoples R China
基金
中国国家自然科学基金;
关键词
advanced persistent threats; provenance graph; long-term features extraction;
D O I
10.1007/s11704-024-40610-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced Persistent Threats (APTs) pose significant challenges to detect due to their "low-and-slow" attack patterns and frequent use of zero-day vulnerabilities. Within this task, the extraction of long-term features is often crucial. In this work, we propose a novel end-to-end APT detection framework named Long-Term Feature Association Provenance Graph Detector (LT-ProveGD). Specifically, LT-ProveGD encodes contextual information of the dynamic provenance graph while preserving the topological information with space efficiency. To combat "low-and-slow" attacks, LT-ProveGD develops an autoencoder with an integrated multi-head attention mechanism to extract long-term dependencies within the encoded representations. Furthermore, to facilitate the detection of previously unknown attacks, we leverage Jenks' natural breaks methodology, enabling detection without relying on specific attack information. By conducting extensive experiments on five widely used datasets with state-of-the-art attack detection methods, we demonstrate the superior effectiveness of LT-ProveGD.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] ConGraph: Advanced Persistent Threat Detection Method Based on Provenance Graph Combined with Process Context in Cyber-Physical System Environment
    Li, Linrui
    Chen, Wen
    ELECTRONICS, 2024, 13 (05)
  • [32] Long-term causal inference under persistent confounding via data combination
    Imbens, Guido
    Kallus, Nathan
    Mao, Xiaojie
    Wang, Yuhao
    JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES B-STATISTICAL METHODOLOGY, 2024,
  • [33] Mining Logs for Long-Term Patterns
    Novikov, Boris
    Michailova, Elena
    Vasilik, Dmitri
    Ivannikova, Ekaterina
    Pigul, Alice
    DATABASES AND INFORMATION SYSTEMS VII, 2013, 249 : 57 - 70
  • [34] Data mining: A long-term dream
    Waltz, D
    Hong, SJ
    IEEE INTELLIGENT SYSTEMS & THEIR APPLICATIONS, 1999, 14 (06): : 30 - 31
  • [35] Micro-cracks detection of solar cells surface via combining short-term and long-term deep features
    Qian, Xiaoliang
    Li, Jing
    Cao, Jinde
    Wu, Yuanyuan
    Wang, Wei
    NEURAL NETWORKS, 2020, 127 : 132 - 140
  • [36] Learning Long-Term Spatial-Temporal Graphs for Active Speaker Detection
    Min, Kyle
    Roy, Sourya
    Tripathi, Subarna
    Guha, Tanaya
    Majumdar, Somdeb
    COMPUTER VISION - ECCV 2022, PT XXXV, 2022, 13695 : 371 - 387
  • [37] Deep Reinforcement Learning for Advanced Persistent Threat Detection in Wireless Networks
    Saheed, Kazeem
    Henna, Shagufta
    2023 31ST IRISH CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COGNITIVE SCIENCE, AICS, 2023,
  • [38] Analysis of high volumes of network traffic for Advanced Persistent Threat detection
    Marchetti, Mirco
    Pierazzi, Fabio
    Colajanni, Michele
    Guido, Alessandro
    COMPUTER NETWORKS, 2016, 109 : 127 - 141
  • [39] Advanced Persistent Threat Detection and Mitigation Using Machine Learning Model
    Sakthivelu, U.
    Kumar, C. N. S. Vinoth
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 36 (03): : 3691 - 3707
  • [40] Detection of Command and Control in Advanced Persistent Threat based on Independent Access
    Wang, Xu
    Zheng, Kangfeng
    Niu, Xinxin
    Wu, Bin
    Wu, Chunhua
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,