CAPTAIN: Community-based Advanced Persistent Threat Analysis in IT Networks

被引:1
|
作者
Ramaki, Ali Ahmadian [1 ,2 ]
Ghaemi-Bafghi, Abbas [1 ]
Rasoolzadegan, Abbas [2 ]
机构
[1] Ferdowsi Univ Mashhad, Data & Commun Secur Lab, Mashhad, Iran
[2] Ferdowsi Univ Mashhad, Software Qual Lab, Mashhad, Iran
关键词
Advanced persistent threat (APT); Intrusion kill chain (IKC); Attacker behavior modeling; Heterogeneous event correlation; Community detection; ALERT CORRELATION; FRAMEWORK;
D O I
10.1016/j.ijcip.2023.100620
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Organizations that possess valuable information assets and critical infrastructure are prone to Advanced Persistent Threats (APTs). The life cycle of this type of modern attack consists of multiple stages called Intrusion Kill Chain (IKC). As one of the most common approaches to deal with these attacks, organizations' security staff use various heterogeneous security and non-security sensors in different lines of defense (Network, Host, and Application) as the primary detection levels in the monitored IT network to log the attacker's intrusive activities. They then model their behaviors by using logged events to detect the IKC of APT attacks. However, numerous methods proposed in the literature have three primary drawbacks: 1) the inability to use both security and non-security sensors of the three mentioned detection levels in event correlation analysis, 2) high dependence on expert knowledge in setting up and maintaining common attack patterns, and 3) incapability to provide a visual representation of the attack path for security administrators to better track on-the-fly attacks in a monitored network. This paper presents a system for Community-based Advanced Persistent Threat Analysis in IT Networks (CAPTAIN) to address the aforementioned issues and challenges. The CAPTAIN framework comprises two distinct phases (including 12 different activities) that receive raw events logged by heterogeneous sensors as input and detect possible IKCs of the APT attacks as output. This system implements a novel graph-based attackers' behavior modeling technique for detecting the IKC of APT attacks by correlating analysis of logged events and leveraging knowledge discovery on the graph. Our evaluation of the two publicly available standard datasets, Bryant and DARPA Transparent Computing, indicates that the CAPTAIN is robust, reliable against high volume events, and can detect the IKC of APT attacks with high accuracy and low false positive rates.
引用
收藏
页数:31
相关论文
共 50 条
  • [31] Analysis of high volumes of network traffic for Advanced Persistent Threat detection
    Marchetti, Mirco
    Pierazzi, Fabio
    Colajanni, Michele
    Guido, Alessandro
    COMPUTER NETWORKS, 2016, 109 : 127 - 141
  • [32] Detecting Advanced Persistent Threat Malware Using Machine Learning-Based Threat Hunting
    Lin, Tien-Chih
    Guo, Cheng-Chung
    Yang, Chu -Sing
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 760 - 768
  • [33] Survivability Analysis of a Computer System Under an Advanced Persistent Threat Attack
    Rodriguez, Ricardo J.
    Chang, Xiaolin
    Li, Xiaodan
    Trivedi, Kishor S.
    GRAPHICAL MODELS FOR SECURITY, GRAMSEC 2016, 2016, 9987 : 134 - 149
  • [34] Advanced persistent threat organization identification based on software gene of malware
    Chen, Weixiang
    Helu, Xiaohan
    Jin, Chengjie
    Zhang, Man
    Lu, Hui
    Sun, Yanbin
    Tian, Zhihong
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (12)
  • [35] A Community-Based Routing Algorithm for Opportunistic Networks
    Ma Xuebin
    Bai Xiangyu
    2013 FIFTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2013, : 701 - 706
  • [36] Community-based anomaly detection in evolutionary networks
    Zhengzhang Chen
    William Hendrix
    Nagiza F. Samatova
    Journal of Intelligent Information Systems, 2012, 39 : 59 - 85
  • [37] Navigating governance networks for community-based conservation
    Alexander, Steven M.
    Andrachuk, Mark
    Armitage, Derek
    FRONTIERS IN ECOLOGY AND THE ENVIRONMENT, 2016, 14 (03) : 155 - 164
  • [38] Detection of Command and Control in Advanced Persistent Threat based on Independent Access
    Wang, Xu
    Zheng, Kangfeng
    Niu, Xinxin
    Wu, Bin
    Wu, Chunhua
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [39] An advanced persistent threat in 3G networks: Attacking the home network from roaming networks
    Xenakis, Christos
    Ntantogian, Christoforos
    COMPUTERS & SECURITY, 2014, 40 : 84 - 94
  • [40] Community-Based Link Prediction in Social Networks
    Kuang, Rong
    Liu, Qun
    Yu, Hong
    ADVANCES IN SWARM INTELLIGENCE, ICSI 2016, PT II, 2016, 9713 : 341 - 348