Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools

07/17/2023
by   Feng Dong, et al.
0

Provenance-Based Endpoint Detection and Response (P-EDR) systems are deemed crucial for future APT defenses. Despite the fact that numerous new techniques to improve P-EDR systems have been proposed in academia, it is still unclear whether the industry will adopt P-EDR systems and what improvements the industry desires for P-EDR systems. To this end, we conduct the first set of systematic studies on the effectiveness and the limitations of P-EDR systems. Our study consists of four components: a one-to-one interview, an online questionnaire study, a survey of the relevant literature, and a systematic measurement study. Our research indicates that all industry experts consider P-EDR systems to be more effective than conventional Endpoint Detection and Response (EDR) systems. However, industry experts are concerned about the operating cost of P-EDR systems. In addition, our research reveals three significant gaps between academia and industry: (1) overlooking client-side overhead; (2) imbalanced alarm triage cost and interpretation cost; and (3) excessive server-side memory consumption. This paper's findings provide objective data on the effectiveness of P-EDR systems and how much improvements are needed to adopt P-EDR systems in industry.

READ FULL TEXT
research
04/14/2023

SoK: The MITRE ATT CK Framework in Research and Practice

The MITRE ATT CK framework, a comprehensive knowledge base of adversar...
research
06/14/2021

No Free Lunch: Microservice Practices Reconsidered in Industry

Microservice architecture advocates a number of technologies and practic...
research
01/06/2021

On the Requirements for Serious Games geared towards Software Developers in the Industry

Teaching industry staff on cybersecurity issues is a fundamental activit...
research
05/02/2019

A Survey of Moving Target Defenses for Network Security

Network defense techniques based on traditional tools, techniques, and p...
research
02/27/2023

Bridging the Bubbles: Connecting Academia and Industry in Cybersecurity Research

There is a perceived disconnect between how ad hoc industry solutions an...
research
03/27/2023

On the Need for Artifacts to Support Research on Self-Adaptation Mature for Industrial Adoption

Despite the vast body of knowledge developed by the self-adaptive system...
research
08/10/2023

Analysis of the LockBit 3.0 and its infiltration into Advanced's infrastructure crippling NHS services

The LockBit 3.0 ransomware variant is arguably the most threatening of m...

Please sign up or login with your details

Forgot password? Click here to reset