A Query Tool for Efficiently Investigating Risky Software Behaviors

10/04/2018
by   Peng Gao, et al.
0

Advanced Persistent Threat (APT) attacks are sophisticated and stealthy, exploiting multiple software vulnerabilities and plaguing many well-protected businesses with significant financial losses. Due to the complexity introduced by numerous installed software applications and the limited visibility into their behaviors, enterprises are seeking solutions to connect and investigate risky software behaviors across software applications. In this demo, we present AIQL, a tool for investigating complex risky software behaviors via interactive queries. To obtain a global view of software behaviors, AIQL is built upon ubiquitous system monitoring, which records interactions among software applications and system resources. In particular, AIQL provides: (1) domain-specific data model and storage for storing the massive system monitoring data, (2) a domain-specific query language, Attack Investigation Query Language, which integrates critical primitives for risky behavior specification, and (3) an optimized query engine based on the characteristics of the data and the query to efficiently schedule the execution. Demo URL: https://youtu.be/2dDVngg0UN8

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/06/2018

AIQL: Enabling Efficient Attack Investigation from System Monitoring Data

The need for countering Advanced Persistent Threat (APT) attacks has led...
research
03/19/2019

A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security

The need for countering Advanced Persistent Threat (APT) attacks has led...
research
01/17/2021

A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence

Log-based cyber threat hunting has emerged as an important solution to c...
research
06/25/2018

SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection

Recently, advanced cyber attacks, which consist of a sequence of steps t...
research
11/10/2022

Zebra: Deeply Integrating System-Level Provenance Search and Tracking for Efficient Attack Investigation

System auditing has emerged as a key approach for monitoring system call...
research
11/18/2015

Behavior Query Discovery in System-Generated Temporal Graphs

Computer system monitoring generates huge amounts of logs that record th...
research
08/03/2023

Domain specificity and data efficiency in typo tolerant spell checkers: the case of search in online marketplaces

Typographical errors are a major source of frustration for visitors of o...

Please sign up or login with your details

Forgot password? Click here to reset