ANUBIS: A Provenance Graph-Based Framework for Advanced Persistent Threat Detection

12/21/2021
by   Md. Monowar Anjum, et al.
0

We present ANUBIS, a highly effective machine learning-based APT detection system. Our design philosophy for ANUBIS involves two principal components. Firstly, we intend ANUBIS to be effectively utilized by cyber-response teams. Therefore, prediction explainability is one of the main focuses of ANUBIS design. Secondly, ANUBIS uses system provenance graphs to capture causality and thereby achieve high detection performance. At the core of the predictive capability of ANUBIS, there is a Bayesian Neural Network that can tell how confident it is in its predictions. We evaluate ANUBIS against a recent APT dataset (DARPA OpTC) and show that ANUBIS can detect malicious activity akin to APT campaigns with high accuracy. Moreover, ANUBIS learns about high-level patterns that allow it to explain its predictions to threat analysts. The high predictive performance with explainable attack story reconstruction makes ANUBIS an effective tool to use for enterprise cyber defense.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/16/2022

CGraph: Graph Based Extensible Predictive Domain Threat Intelligence Platform

Ability to effectively investigate indicators of compromise and associat...
research
08/18/2022

LogKernel A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering

Cyber threat hunting is a proactive search process for hidden threats in...
research
09/15/2023

XFedHunter: An Explainable Federated Learning Framework for Advanced Persistent Threat Detection in SDN

Advanced Persistent Threat (APT) attacks are highly sophisticated and em...
research
02/12/2018

RAPPER: Ransomware Prevention via Performance Counters

Ransomware can produce direct and controllable economic loss, which make...
research
03/04/2021

Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat Detection Research

Maintaining security and privacy in real-world enterprise networks is be...
research
09/02/2022

Tweaking Metasploit to Evade Encrypted C2 Traffic Detection

Command and Control (C2) communication is a key component of any structu...

Please sign up or login with your details

Forgot password? Click here to reset