LogPrécis: Unleashing Language Models for Automated Shell Log Analysis

07/17/2023
by   Matteo Boffa, et al.
0

The collection of security-related logs holds the key to understanding attack behaviors and diagnosing vulnerabilities. Still, their analysis remains a daunting challenge. Recently, Language Models (LMs) have demonstrated unmatched potential in understanding natural and programming languages. The question arises whether and how LMs could be also useful for security experts since their logs contain intrinsically confused and obfuscated information. In this paper, we systematically study how to benefit from the state-of-the-art in LM to automatically analyze text-like Unix shell attack logs. We present a thorough design methodology that leads to LogPrécis. It receives as input raw shell sessions and automatically identifies and assigns the attacker tactic to each portion of the session, i.e., unveiling the sequence of the attacker's goals. We demonstrate LogPrécis capability to support the analysis of two large datasets containing about 400,000 unique Unix shell attacks. LogPrécis reduces them into about 3,000 fingerprints, each grouping sessions with the same sequence of tactics. The abstraction it provides lets the analyst better understand attacks, identify fingerprints, detect novelty, link similar attacks, and track families and mutations. Overall, LogPrécis, released as open source, paves the way for better and more responsive defense against cyberattacks.

READ FULL TEXT

page 3

page 9

research
10/12/2018

ProPatrol: Attack Investigation via Extracted High-Level Tasks

Kernel audit logs are an invaluable source of information in the forensi...
research
04/28/2023

Using Large Language Models for Interpreting Autonomous Robots Behaviors

The deployment of autonomous robots in various domains has raised signif...
research
04/22/2023

Did We Miss Something Important? Studying and Exploring Variable-Aware Log Abstraction

Due to the sheer size of software logs, developers rely on automated tec...
research
07/21/2019

Secure and Transparent Audit Logs with BlockAudit

Audit logs serve as a critical component in enterprise business systems ...
research
05/24/2023

From Text to MITRE Techniques: Exploring the Malicious Use of Large Language Models for Generating Cyber Attack Payloads

This research article critically examines the potential risks and implic...
research
10/12/2022

Understanding Impacts of Task Similarity on Backdoor Attack and Detection

With extensive studies on backdoor attack and detection, still fundament...
research
06/01/2022

Mining Function Homology of Bot Loaders from Honeypot Logs

Self-contained loaders are widely adopted in botnets for injecting loadi...

Please sign up or login with your details

Forgot password? Click here to reset