CAPTAIN: Community-based Advanced Persistent Threat Analysis in IT Networks

被引:1
|
作者
Ramaki, Ali Ahmadian [1 ,2 ]
Ghaemi-Bafghi, Abbas [1 ]
Rasoolzadegan, Abbas [2 ]
机构
[1] Ferdowsi Univ Mashhad, Data & Commun Secur Lab, Mashhad, Iran
[2] Ferdowsi Univ Mashhad, Software Qual Lab, Mashhad, Iran
关键词
Advanced persistent threat (APT); Intrusion kill chain (IKC); Attacker behavior modeling; Heterogeneous event correlation; Community detection; ALERT CORRELATION; FRAMEWORK;
D O I
10.1016/j.ijcip.2023.100620
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Organizations that possess valuable information assets and critical infrastructure are prone to Advanced Persistent Threats (APTs). The life cycle of this type of modern attack consists of multiple stages called Intrusion Kill Chain (IKC). As one of the most common approaches to deal with these attacks, organizations' security staff use various heterogeneous security and non-security sensors in different lines of defense (Network, Host, and Application) as the primary detection levels in the monitored IT network to log the attacker's intrusive activities. They then model their behaviors by using logged events to detect the IKC of APT attacks. However, numerous methods proposed in the literature have three primary drawbacks: 1) the inability to use both security and non-security sensors of the three mentioned detection levels in event correlation analysis, 2) high dependence on expert knowledge in setting up and maintaining common attack patterns, and 3) incapability to provide a visual representation of the attack path for security administrators to better track on-the-fly attacks in a monitored network. This paper presents a system for Community-based Advanced Persistent Threat Analysis in IT Networks (CAPTAIN) to address the aforementioned issues and challenges. The CAPTAIN framework comprises two distinct phases (including 12 different activities) that receive raw events logged by heterogeneous sensors as input and detect possible IKCs of the APT attacks as output. This system implements a novel graph-based attackers' behavior modeling technique for detecting the IKC of APT attacks by correlating analysis of logged events and leveraging knowledge discovery on the graph. Our evaluation of the two publicly available standard datasets, Bryant and DARPA Transparent Computing, indicates that the CAPTAIN is robust, reliable against high volume events, and can detect the IKC of APT attacks with high accuracy and low false positive rates.
引用
收藏
页数:31
相关论文
共 50 条
  • [21] Learning Overlapping Community-Based Networks
    Yuan, Yanli
    Soh, De Wen
    Yang, Howard H.
    Quek, Tony Q. S.
    IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2019, 5 (04): : 684 - 697
  • [22] Threat led advanced persistent threat penetration test
    Masarweh A.
    Al-Saraireh J.
    International Journal of Security and Networks, 2022, 17 (03): : 203 - 219
  • [23] Dynamic defense strategy against advanced persistent threat under heterogeneous networks
    Lv, Kun
    Chen, Yun
    Hu, Changzhen
    INFORMATION FUSION, 2019, 49 : 216 - 226
  • [24] Hepatitis C, a silent threat to the community of Haryana, India: a community-based study
    Verma, Ramesh
    Behera, Binod Kumar
    Jain, R. B.
    Arora, Varun
    Chayal, Vinod
    Gill, P. S.
    AUSTRALASIAN MEDICAL JOURNAL, 2014, 7 (01): : 11 - 16
  • [25] Community-Based Relational Markov Networks in Complex Networks
    Wan, Huaiyu
    Lin, Youfang
    Jia, Caiyan
    Huang, Houkuan
    ROUGH SETS AND KNOWLEDGE TECHNOLOGY, 2011, 6954 : 301 - 310
  • [26] Delay Analysis of Epidemic Routing in Community-Based Delay Tolerant Networks
    Wang, Qingshan
    Wang, Qi
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1944 - 1949
  • [27] Special Issue on Advanced Persistent Threat
    Chen, Jiageng
    Su, Chunhua
    Yeh, Kuo-Hui
    Yung, Moti
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 79 : 243 - 246
  • [28] BIOS Integrity An Advanced Persistent Threat
    Butt, Muhammad Irfan Afzal
    2014 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2014, : 47 - 50
  • [29] Community-based rumor blocking maximization in social networks: Algorithms and analysis
    Ni, Qiufen
    Guo, Jianxiong
    Huang, Chuanhe
    Wu, Weili
    THEORETICAL COMPUTER SCIENCE, 2020, 840 : 257 - 269
  • [30] Advanced Persistent Threat Detection: A Survey
    Khalid, Adam
    Zainal, Anazida
    Maarof, Mohd Aizaini
    Ghaleb, Fuad A.
    2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC), 2021, : 84 - 89