A Heterogeneous Graph Learning Model for Cyber-Attack Detection

12/16/2021
by   Mingqi Lv, et al.
0

A cyber-attack is a malicious attempt by experienced hackers to breach the target information system. Usually, the cyber-attacks are characterized as hybrid TTPs (Tactics, Techniques, and Procedures) and long-term adversarial behaviors, making the traditional intrusion detection methods ineffective. Most existing cyber-attack detection systems are implemented based on manually designed rules by referring to domain knowledge (e.g., threat models, threat intelligences). However, this process is lack of intelligence and generalization ability. Aiming at this limitation, this paper proposes an intelligent cyber-attack detection method based on provenance data. To effective and efficient detect cyber-attacks from a huge number of system events in the provenance data, we firstly model the provenance data by a heterogeneous graph to capture the rich context information of each system entities (e.g., process, file, socket, etc.), and learns a semantic vector representation for each system entity. Then, we perform online cyber-attack detection by sampling a small and compact local graph from the heterogeneous graph, and classifying the key system entities as malicious or benign. We conducted a series of experiments on two provenance datasets with real cyber-attacks. The experiment results show that the proposed method outperforms other learning based detection models, and has competitive performance against state-of-the-art rule based cyber-attack detection systems.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/09/2022

On Specification-based Cyber-Attack Detection in Smart Grids

The transformation of power grids into intelligent cyber-physical system...
research
02/16/2022

CGraph: Graph Based Extensible Predictive Domain Threat Intelligence Platform

Ability to effectively investigate indicators of compromise and associat...
research
08/30/2021

A Novel Approach to Detect Phishing Attacks using Binary Visualisation and Machine Learning

Protecting and preventing sensitive data from being used inappropriately...
research
06/13/2023

Few-shot Multi-domain Knowledge Rearming for Context-aware Defence against Advanced Persistent Threats

Advanced persistent threats (APTs) have novel features such as multi-sta...
research
09/17/2019

Network entity characterization and attack prediction

The devastating effects of cyber-attacks, highlight the need for novel a...
research
03/05/2023

Cyber Vaccine for Deepfake Immunity

Deepfakes pose an evolving threat to cybersecurity, which calls for the ...
research
08/10/2020

Directional Laplacian Centrality for Cyber Situational Awareness

Cyber operations is drowning in diverse, high-volume, multi-source data....

Please sign up or login with your details

Forgot password? Click here to reset