Alerts Correlation and Causal Analysis for APT Based Cyber Attack Detection

被引:19
|
作者
Khosravi, Mehran [1 ]
Ladani, Behrouz Tork [1 ]
机构
[1] Univ Isfahan, Fac Comp Engn, Esfahan 8174673441, Iran
来源
IEEE ACCESS | 2020年 / 8卷
关键词
Sensors; Hidden Markov models; Correlation; Malware; Cyberattack; Computational modeling; Advanced persistent threat (APT); attack process modeling; alerts correlation; causal analysis; ADVANCED PERSISTENT THREATS; CROSS-VALIDATION;
D O I
10.1109/ACCESS.2020.3021499
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of Advanced Persistent Threat (APT) as a new concept in cyber warfare has raised many concerns in recent years. APT based cyber-attacks are usually stealthy, stepwise, slow, long-term, planned, and based on a set of varied zero-day vulnerabilities. As a result, these attacks behave as diverse and dynamic as possible, and hence the generated alerts for these attacks are normally below the common detection thresholds of the conventional attacks. Therefore, the present approaches are not mostly able to effectively detect or analyze the behavior of this class of attacks. In this article, an approach for real-time detection of APT based cyber-attacks based on causal analysis and correlating the generated alerts by security and non-security sensors is introduced. The proposed method computes the infection score of hosts by modeling, discovery, and analysis of causal relationships among APT steps. For this purpose, a dynamic programming algorithm is introduced which works on alerts of each host separately and conducts a long-term analysis on the attack process to combat the outlasting feature of the APT attacks yet coping with a high volume of alert information. The proposed method is implemented and extensively evaluated using a semi real-world dataset and simulation. The experimental results show that the proposed approach can effectively rank hosts based on their infection likelihood with acceptable accuracy.
引用
收藏
页码:162642 / 162656
页数:15
相关论文
共 50 条
  • [41] Integrated Situational Awareness for Cyber Attack Detection, Analysis, and Mitigation
    Cheng, Yi
    Sagduyu, Yalin
    Deng, Julia
    Li, Jason
    Liu, Peng
    [J]. SENSORS AND SYSTEMS FOR SPACE APPLICATIONS V, 2012, 8385
  • [42] Cyber Attack Detection for WAMPAC-based HVDC Applications
    Chen, Bo
    Yim, Sang-il
    Kim, Hyekyung
    Nuqui, Reynaldo
    [J]. 2020 IEEE/PES TRANSMISSION AND DISTRIBUTION CONFERENCE AND EXPOSITION (T&D), 2020,
  • [43] A Cyber-Attack Detection Model Based on Multivariate Analyses
    Sakai, Yuto
    Rinsaka, Koichiro
    Dohi, Tadashi
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (07) : 1585 - 1592
  • [44] Extracting and Evaluating Similar and Unique Cyber Attack Strategies from Intrusion Alerts
    Moskal, Stephen
    Yang, Shanchieh Jay
    Kuhl, Michael E.
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2018, : 49 - 54
  • [45] An effective cyber attack detection system based on an improved OMPCA
    Elkhadir, Zyad
    Chougdali, Khalid
    Benattou, Mohammed
    [J]. 2017 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2017, : 105 - 110
  • [46] Adaptive, model-based monitoring for cyber attack detection
    Valdes, A
    Skinner, K
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2000, 1907 : 80 - 92
  • [47] Cyber-attack detection based on controlled invariant sets
    Rosich, Albert
    Voos, Holger
    Darouach, Mohamed
    [J]. 2014 EUROPEAN CONTROL CONFERENCE (ECC), 2014, : 2176 - 2181
  • [48] Synthesizing Perception Based on Analysis of Cyber Attack Environments
    Sunny, Sherin
    Pavithran, Vipin
    Achuthan, Krishnashree
    [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 2027 - 2030
  • [49] A Research on Architecture of APT Attack Detection and Countering Technology
    Chen, Rui-Dong
    Zhang, Xiao-Song
    Niu, Wei-Na
    Lan, Hao-Yue
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2019, 48 (06): : 870 - 879
  • [50] Real-time analysis of intrusion detection alerts via correlation
    Lee, Soojin
    Chung, Byungchun
    Kim, Heeyoul
    Lee, Yunho
    Park, Chanil
    Yoon, Hyunsoo
    [J]. COMPUTERS & SECURITY, 2006, 25 (03) : 169 - 183