PARGMF: A provenance-enabled automated rule generation and matching framework with multi-level attack description model

被引:1
|
作者
Zipperle, Michael [1 ,2 ]
Zhang, Yu [1 ]
Chang, Elizabeth [3 ]
Dillon, Tharam [4 ]
机构
[1] UNSW Canberra, Sch Business, Northcott Dr, Campbell, ACT 2612, Australia
[2] Cyber Secur Cooperat Res Ctr, Joondalup Dr, Joondalup, WA 6027, Australia
[3] Griffith Univ, Sch Informat & Commun Technol, 1 Parklands Dr, Southport, Qld 4215, Australia
[4] La Trobe Univ, Dept Comp Sci & Informat Technol, Plenty Rd,Kingsbury Dr, Bundoora, Vic 3086, Australia
关键词
Intrusion detection systems; Provenance graphs; Rule generation; Alarm validation; Forensic analysis; Malware analysis;
D O I
10.1016/j.jisa.2023.103682
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapidly increasing volume of cyber-attacks over the past years due to the new working-from-home paradigm, protecting hosts, networks, and individuals from cyber threats is in higher demand than ever. One promising solution are Provenance-based Intrusion Detection Systems (PIDS), which correlate host-based security logs to generate provenance graphs that describe the causal relationship between system entities. PIDS have shown significant potential in enhancing detection performance and reducing false alarms compared to traditional Intrusion Detection Systems (IDS). Rule-based approaches used in PIDS utilize expert-defined rule sets to identify known malicious patterns in provenance graphs. Although these rule-based techniques have been widely applied, they can only detect known attack patterns, are heavily dependent on the quality of the rules, and creating rules manually is time-consuming. To address these shortcomings, this study proposed two novel techniques: the Multi-level Attack Description Model (MADM) for describing attack patterns at multiple granularity levels and the Provenance-enabled Automated Rule Generation and Matching Framework (PARGMF) to generate rules deterministically and promptly. We evaluated the proposed approaches using the DARPA OpTC dataset, complemented by a practical case study. This case study involved a prototype extension for the CAPEv2 sandbox environment, demonstrating the real-world applicability of our approaches. Our results demonstrate, firstly, that PARGMF generates rules deterministically with an average processing time of only 13.11 s compared to multiple hours or even days for manual rule creation by security experts. Secondly, through generalization of attack descriptions, MADM enhanced the robustness of rules by 21.9% for Behavioural Attack Description (BAD) and 25% for Structural Attack Description (SAD) compared to approaches without generalization. Another added benefit compared to existing approaches is that PARGMF also generates differential graphs to support security experts' timely validation of security alarms.
引用
收藏
页数:12
相关论文
共 2 条
  • [1] An Attack Description and Response Architecture Based on Multi-level Rule Expression Language
    Souissi, Samih
    Sliman, Layth
    Charroux, Benoit
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2016, 11 (01): : 48 - 57
  • [2] Multi-objective math problem generation using large language model through an adaptive multi-level retrieval augmentation framework
    Sun, Jianwen
    Shi, Wangzi
    Shen, Xiaoxuan
    Liu, Shengyingjie
    Wei, Luona
    Wan, Qian
    INFORMATION FUSION, 2025, 119