Threat detection and investigation with system-level provenance graphs: A survey

被引:40
|
作者
Li, Zhenyuan [1 ]
Chen, Qi Alfred [4 ]
Yang, Runqing [2 ]
Chen, Yan [5 ]
Ruan, Wei [3 ]
机构
[1] Zhejiang Univ, Hangzhou, Peoples R China
[2] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou, Peoples R China
[3] Zhejiang Univ, Coll Control, Hangzhou, Peoples R China
[4] Univ Calif Irvine, Dept Comp Sci, Irvine, CA USA
[5] Northwestern Univ, Dept Elect Engn & Comp Sci, Evanston, IL USA
基金
中国国家自然科学基金;
关键词
Cyber Threat; Provenance Graph; Intrusion Detection; Digital Forensic; Information Flow;
D O I
10.1016/j.cose.2021.102282
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of information technology, the border of the cyberspace gets much broader and thus also exposes increasingly more vulnerabilities to attackers. Traditional mitigation-based defence strategies are challenging to cope with the current complicated situation. Security practitioners urgently need better tools to describe and modelling attacks for defense. The provenance graph seems like an ideal method for threat modelling with powerful semantic expression ability and attacks historic correlation ability. In this paper, we firstly introduce the basic concepts about system-level provenance graph and present a typical system architecture for provenance graph-based threat detection and investigation. A comprehensive provenance graph-based threat detection system can be divided into three modules: data collection module, data management module , and threat detection modules . Each module contains several components and involves different research problems. We systematically taxonomize and compare the existing algorithms and designs involved in them. Based on these comparisons, we identify the strategy of technology selection for real-world deployment. We also provide insights and challenges about the existing work to guide future research in this area. (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] System-level protection and hardware Trojan detection using weighted voting
    Amin, Hany A. M.
    Alkabani, Yousra
    Selim, Gamal M. I.
    JOURNAL OF ADVANCED RESEARCH, 2014, 5 (04) : 499 - 505
  • [32] Performance Anomaly Detection through Sequence Alignment of System-Level Traces
    Janecek, Madeline
    Ezzati-Jivan, Naser
    Hamou-Lhadj, Abdelwahab
    30TH IEEE/ACM INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC 2022), 2022, : 264 - 274
  • [33] Data Analytics to Aid Detection of Marginal Defects in System-Level Test
    Chen, Harry H.
    2016 INTERNATIONAL SYMPOSIUM ON VLSI DESIGN, AUTOMATION AND TEST (VLSI-DAT), 2016,
  • [34] System-level interconnect prediction
    Dambre, Joni
    Hutton, Mike
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2007, 15 (08) : 853 - 854
  • [35] System-level interconnect prediction
    Christie, P
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2003, 11 (01) : 1 - 2
  • [36] A System-Level Game Semantics
    Ghica, Dan R.
    Tzevelekos, Nikos
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2012, 286 : 191 - 211
  • [37] Aspects on system-level design
    Plantin, J
    Stoy, E
    PROCEEDINGS OF THE SEVENTH INTERNATIONAL WORKSHOP ON HARDWARE/SOFTWARE CODESIGN (CODES'99), 1999, : 209 - 210
  • [38] System-level partitioning with uncertainty
    Albuquerque, J
    Coelho, C
    Cavalcanti, CF
    da Silva, DC
    Fernandes, AO
    PROCEEDINGS OF THE SEVENTH INTERNATIONAL WORKSHOP ON HARDWARE/SOFTWARE CODESIGN (CODES'99), 1999, : 198 - 202
  • [39] System-Level Airworthiness Tool
    Burke, David A.
    Hall, Charles E., Jr.
    Cook, Stephen P.
    JOURNAL OF AIRCRAFT, 2011, 48 (03): : 777 - 785
  • [40] System-level exploration with SpecSyn
    Gajski, DD
    Vahid, F
    Narayan, S
    Gong, J
    1998 DESIGN AUTOMATION CONFERENCE, PROCEEDINGS, 1998, : 812 - 817