Threat detection and investigation with system-level provenance graphs: A survey

被引:40
|
作者
Li, Zhenyuan [1 ]
Chen, Qi Alfred [4 ]
Yang, Runqing [2 ]
Chen, Yan [5 ]
Ruan, Wei [3 ]
机构
[1] Zhejiang Univ, Hangzhou, Peoples R China
[2] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou, Peoples R China
[3] Zhejiang Univ, Coll Control, Hangzhou, Peoples R China
[4] Univ Calif Irvine, Dept Comp Sci, Irvine, CA USA
[5] Northwestern Univ, Dept Elect Engn & Comp Sci, Evanston, IL USA
基金
中国国家自然科学基金;
关键词
Cyber Threat; Provenance Graph; Intrusion Detection; Digital Forensic; Information Flow;
D O I
10.1016/j.cose.2021.102282
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of information technology, the border of the cyberspace gets much broader and thus also exposes increasingly more vulnerabilities to attackers. Traditional mitigation-based defence strategies are challenging to cope with the current complicated situation. Security practitioners urgently need better tools to describe and modelling attacks for defense. The provenance graph seems like an ideal method for threat modelling with powerful semantic expression ability and attacks historic correlation ability. In this paper, we firstly introduce the basic concepts about system-level provenance graph and present a typical system architecture for provenance graph-based threat detection and investigation. A comprehensive provenance graph-based threat detection system can be divided into three modules: data collection module, data management module , and threat detection modules . Each module contains several components and involves different research problems. We systematically taxonomize and compare the existing algorithms and designs involved in them. Based on these comparisons, we identify the strategy of technology selection for real-world deployment. We also provide insights and challenges about the existing work to guide future research in this area. (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] A baseline for unsupervised advanced persistent threat detection in system-level provenance
    Berrada, Ghita
    Cheney, James
    Benabderrahmane, Sidahmed
    Maxwell, William
    Mookherjee, Himan
    Theriault, Alec
    Wright, Ryan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 : 401 - 413
  • [2] Efficient Differencing of System-level Provenance Graphs
    Nakamura, Yuta
    Kanj, Iyad
    Malik, Tanu
    PROCEEDINGS OF THE 32ND ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2023, 2023, : 4220 - 4223
  • [3] Analysing system behaviour by automatic benchmarking of system-level provenance
    Chan, Sheung Chi
    MIDDLEWARE'19: PROCEEDINGS OF THE 2019 20TH INTERNATIONAL MIDDLEWARE CONFERENCE DOCTORAL SYMPOSIUM, 2019, : 1 - 5
  • [4] Addressing System-Level Optimization with OpenVX Graphs
    Rainey, Erik
    Villarreal, Jesse
    Dedeoglu, Goksel
    Pulli, Kari
    Lepley, Thierry
    Brill, Frank
    2014 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW), 2014, : 658 - +
  • [5] System-level data management for endpoint advanced persistent threat detection: Issues, challenges and trends
    Chen, Tieming
    Zheng, Chenbin
    Zhu, Tiantian
    Xiong, Chunlin
    Ying, Jie
    Yuan, Qixuan
    Cheng, Wenrui
    Lv, Mingqi
    COMPUTERS & SECURITY, 2023, 135
  • [6] SYSTEM-LEVEL FAULT-DIAGNOSIS - A SURVEY
    KREUTZER, SE
    HAKIMI, SL
    MICROPROCESSING AND MICROPROGRAMMING, 1987, 20 (4-5): : 323 - 330
  • [7] A Survey of Comparison-Based System-Level Diagnosis
    Duarte, Elias P., Jr.
    Ziwich, Roverli P.
    Albini, Luiz C. P.
    ACM COMPUTING SURVEYS, 2011, 43 (03)
  • [8] A System-Level Investigation into the Mechanisms of Apigenin Against Inflammation
    Xie, Ying
    Liang, Dongdong
    Wu, Qingke
    Chen, Xuemei
    Buabeid, Manal Ali
    Wang, Yanfei
    NATURAL PRODUCT COMMUNICATIONS, 2019, 14 (09)
  • [9] COMPONENT-LEVEL REDUNDANCY IS BETTER THAN SYSTEM-LEVEL REDUNDANCY FOR CHANNEL GRAPHS
    HWANG, FK
    SHEPP, LA
    NETWORKS, 1985, 15 (04) : 449 - 453
  • [10] System-level synthesis of MEMS via genetic programming and bond graphs
    Fan, Z
    Seo, KS
    Hu, JJ
    Rosenberg, RC
    Goodman, ED
    GENETIC AND EVOLUTIONARY COMPUTATION - GECCO 2003, PT II, PROCEEDINGS, 2003, 2724 : 2058 - 2071