Anomaly Detection in Log Data using Graph Databases and Machine Learning to Defend Advanced Persistent Threats

02/01/2018
by   Timo Schindler, et al.
0

Advanced Persistent Threats (APTs) are a main impendence in cyber security of computer networks. In 2015, a successful breach remains undetected 146 days on average, reported by [Fi16].With our work we demonstrate a feasible and fast way to analyse real world log data to detect breaches or breach attempts. By adapting well-known kill chain mechanisms and a combine of a time series database and an abstracted graph approach, it is possible to create flexible attack profiles. Using this approach, it can be demonstrated that the graph analysis successfully detects simulated attacks by analysing the log data of a simulated computer network. Considering another source for log data, the framework is capable to deliver sufficient performance for analysing real-world data in short time. By using the computing power of the graph database it is possible to identify the attacker and furthermore it is feasible to detect other affected system components. We believe to significantly reduce the detection time of breaches with this approach and react fast to new attack vectors.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/23/2021

An Empirical Assessment of Endpoint Security Systems Against Advanced Persistent Threats Attack Vectors

Advanced persistent threats pose a significant challenge for blue teams ...
research
01/18/2021

Applying High-Performance Bioinformatics Tools for Outlier Detection in Log Data

Most of today's security solutions, such as security information and eve...
research
01/06/2020

UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats

Advanced Persistent Threats (APTs) are difficult to detect due to their ...
research
03/21/2019

On Preempting Advanced Persistent Threats Using Probabilistic Graphical Models

This paper presents PULSAR, a framework for pre-empting Advanced Persist...
research
10/31/2022

Do You Really Need to Disguise Normal Servers as Honeypots?

A honeypot, which is a kind of deception strategy, has been widely used ...
research
11/08/2021

threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning

Host-based threats such as Program Attack, Malware Implantation, and Adv...
research
03/26/2021

Multi-Stage Attack Detection via Kill Chain State Machines

Today, human security analysts collapse under the sheer volume of alerts...

Please sign up or login with your details

Forgot password? Click here to reset