Lateral Movement Detection Using User Behavioral Analysis

08/29/2022
by   Deepak Kushwaha, et al.
0

Lateral Movement refers to methods by which threat actors gain initial access to a network and then progressively move through said network collecting key data about assets until they reach the ultimate target of their attack. Lateral Movement intrusions have become more intricate with the increasing complexity and interconnected nature of enterprise networks, and require equally sophisticated detection mechanisms to proactively detect such threats in near real-time at enterprise scale. In this paper, the authors propose a novel, lightweight method for Lateral Movement detection using user behavioral analysis and machine learning. Specifically, this paper introduces a novel methodology for cyber domain-specific feature engineering that identifies Lateral Movement behavior on a per-user basis. Furthermore, the engineered features have also been used to develop two supervised machine learning models for Lateral Movement identification that have demonstrably outperformed models previously seen in literature while maintaining robust performance on datasets with high class imbalance. The models and methodology introduced in this paper have also been designed in collaboration with security operators to be relevant and interpretable in order to maximize impact and minimize time to value as a cyber threat detection toolkit. The underlying goal of the paper is to provide a computationally efficient, domain-specific approach to near real-time Lateral Movement detection that is interpretable and robust to enterprise-scale data volumes and class imbalance.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/04/2022

Zero Day Threat Detection Using Graph and Flow Based Security Telemetry

Zero Day Threats (ZDT) are novel methods used by malicious actors to att...
research
04/19/2021

Automatic glissade determination through a mathematical model in electrooculographic records

The glissadic overshoot is characterized by an unwanted type of movement...
research
12/08/2021

ESAFE: Enterprise Security and Forensics at Scale

Securing enterprise networks presents challenges in terms of both their ...
research
05/03/2019

Enterprise Cyber Resiliency Against Lateral Movement: A Graph Theoretic Approach

Lateral movement attacks are a serious threat to enterprise security. In...
research
07/10/2019

On Designing Machine Learning Models for Malicious Network Traffic Classification

Machine learning (ML) started to become widely deployed in cyber securit...
research
02/12/2018

RAPPER: Ransomware Prevention via Performance Counters

Ransomware can produce direct and controllable economic loss, which make...
research
07/15/2021

Real-Time Violence Detection Using CNN-LSTM

Violence rates however have been brought down about 57 the past 4 decade...

Please sign up or login with your details

Forgot password? Click here to reset