A baseline for unsupervised advanced persistent threat detection in system-level provenance

被引:13
|
作者
Berrada, Ghita [1 ]
Cheney, James [1 ,3 ]
Benabderrahmane, Sidahmed [1 ]
Maxwell, William [2 ]
Mookherjee, Himan [1 ]
Theriault, Alec [2 ]
Wright, Ryan [2 ]
机构
[1] Univ Edinburgh, Sch Informat, 10 Crichton St, Edinburgh, Midlothian, Scotland
[2] Galois Inc, Portland, OR USA
[3] Alan Turing Inst, London, England
基金
欧洲研究理事会;
关键词
Anomaly detection; Advanced persistent threats; Unsupervised learning; Cyber security; Provenance; DETECTION STRATEGY;
D O I
10.1016/j.future.2020.02.015
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Advanced persistent threats (APTs) are stealthy, sophisticated, and unpredictable cyberattacks that can steal intellectual property, damage critical infrastructure, or cause millions of dollars in damage. Detecting APTs by monitoring system-level activity is difficult because manually inspecting the high volume of normal system activity is overwhelming for security analysts. We evaluate the effectiveness of unsupervised batch and streaming anomaly detection algorithms over multiple gigabytes of provenance traces recorded on four different operating systems to determine whether they can detect realistic APT-like attacks reliably and efficiently. This article is the first detailed study of the effectiveness of generic unsupervised anomaly detection techniques in this setting. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:401 / 413
页数:13
相关论文
共 50 条
  • [31] Advanced Persistent Threat Detection and Mitigation Using Machine Learning Model
    Sakthivelu, U.
    Kumar, C. N. S. Vinoth
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 36 (03): : 3691 - 3707
  • [32] Detection of Command and Control in Advanced Persistent Threat based on Independent Access
    Wang, Xu
    Zheng, Kangfeng
    Niu, Xinxin
    Wu, Bin
    Wu, Chunhua
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [33] XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph
    Ngo Duc Hoang Son
    Huynh Thai Thi
    Phan The Duy
    Van-Hau Pham
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2023, 2023, 14341 : 546 - 561
  • [34] Anteater: Advanced Persistent Threat Detection With Program Network Traffic Behavior
    Zhang, Yangzong
    Liu, Wenjian
    Kuok, Kaiian
    Cheong, Ngai
    IEEE ACCESS, 2024, 12 : 8536 - 8551
  • [35] A Survey on Advanced Persistent Threat Detection: A Unified Framework, Challenges, and Countermeasures
    Zhang, Bo
    Gao, Yansong
    Kuang, Boyu
    Yu, Changlong
    Fu, Anmin
    Susilo, Willy
    ACM COMPUTING SURVEYS, 2025, 57 (03)
  • [36] Multiple fMRI system-level baseline connectivity is disrupted in patients with consciousness alterations
    Demertzi, Athena
    Gomez, Francisco
    Crone, Julia Sophia
    Vanhaudenhuyse, Audrey
    Tshibanda, Luaba
    Noirhomme, Quentin
    Thonnard, Marie
    Chayland-Verville, Vanessa
    Kirsch, Murielle
    Laureys, Steven
    Soddu, Andrea
    CORTEX, 2014, 52 : 35 - 46
  • [37] Survivability Analysis of a Computer System Under an Advanced Persistent Threat Attack
    Rodriguez, Ricardo J.
    Chang, Xiaolin
    Li, Xiaodan
    Trivedi, Kishor S.
    GRAPHICAL MODELS FOR SECURITY, GRAMSEC 2016, 2016, 9987 : 134 - 149
  • [38] Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence
    Ghafir, Ibrahim
    Prenosil, Vaclav
    Hammoudeh, Mohammad
    Han, Liangxiu
    Raza, Umar
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (ICFNDS '17), 2017,
  • [39] Detection of advanced persistent threat using machine-learning correlation analysis
    Ghafir, Ibrahim
    Hammoudeh, Mohammad
    Prenosil, Vaclav
    Han, Liangxiu
    Hegarty, Robert
    Rabie, Khaled
    Aparicio-Navarro, Francisco J.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 : 349 - 359
  • [40] A systematic literature review on advanced persistent threat behaviors and its detection strategy
    Mat, Nur Ilzam Che
    Jamil, Norziana
    Yusoff, Yunus
    Kiah, Miss Laiha Mat
    JOURNAL OF CYBERSECURITY, 2024, 10 (01):