A Rule Mining-Based Advanced Persistent Threats Detection System

05/20/2021
by   Sidahmed Benabderrahmane, et al.
0

Advanced persistent threats (APT) are stealthy cyber-attacks that are aimed at stealing valuable information from target organizations and tend to extend in time. Blocking all APTs is impossible, security experts caution, hence the importance of research on early detection and damage limitation. Whole-system provenance-tracking and provenance trace mining are considered promising as they can help find causal relationships between activities and flag suspicious event sequences as they occur. We introduce an unsupervised method that exploits OS-independent features reflecting process activity to detect realistic APT-like attacks from provenance traces. Anomalous processes are ranked using both frequent and rare event associations learned from traces. Results are then presented as implications which, since interpretable, help leverage causality in explaining the detected anomalies. When evaluated on Transparent Computing program datasets (DARPA), our method outperformed competing approaches.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/17/2019

A baseline for unsupervised advanced persistent threat detection in system-level provenance

Advanced persistent threats (APT) are stealthy, sophisticated, and unpre...
research
08/23/2021

An Empirical Assessment of Endpoint Security Systems Against Advanced Persistent Threats Attack Vectors

Advanced persistent threats pose a significant challenge for blue teams ...
research
03/31/2022

SIERRA: Ranking Anomalous Activities in Enterprise Networks

An enterprise today deploys multiple security middleboxes such as firewa...
research
01/06/2020

UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats

Advanced Persistent Threats (APTs) are difficult to detect due to their ...
research
06/22/2020

Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach

Advanced Persistent Threats (APTs) are stealthy customized attacks by in...
research
03/29/2022

Process Mining Analysis of Puzzle-Based Cybersecurity Training

The hands-on cybersecurity training quality is crucial to mitigate cyber...
research
01/18/2021

Applying High-Performance Bioinformatics Tools for Outlier Detection in Log Data

Most of today's security solutions, such as security information and eve...

Please sign up or login with your details

Forgot password? Click here to reset