Zero Day Threat Detection Using Graph and Flow Based Security Telemetry

05/04/2022
by   Christopher Redino, et al.
0

Zero Day Threats (ZDT) are novel methods used by malicious actors to attack and exploit information technology (IT) networks or infrastructure. In the past few years, the number of these threats has been increasing at an alarming rate and have been costing organizations millions of dollars to remediate. The increasing expansion of network attack surfaces and the exponentially growing number of assets on these networks necessitate the need for a robust AI-based Zero Day Threat detection model that can quickly analyze petabyte-scale data for potentially malicious and novel activity. In this paper, the authors introduce a deep learning based approach to Zero Day Threat detection that can generalize, scale, and effectively identify threats in near real-time. The methodology utilizes network flow telemetry augmented with asset-level graph features, which are passed through a dual-autoencoder structure for anomaly and novelty detection respectively. The models have been trained and tested on four large scale datasets that are representative of real-world organizational networks and they produce strong results with high precision and recall values. The models provide a novel methodology to detect complex threats with low false-positive rates that allow security operators to avoid alert fatigue while drastically reducing their mean time to response with near-real-time detection. Furthermore, the authors also provide a novel, labelled, cyber attack dataset generated from adversarial activity that can be used for validation or training of other models. With this paper, the authors' overarching goal is to provide a novel architecture and training methodology for cyber anomaly detectors that can generalize to multiple IT networks with minimal to no retraining while still maintaining strong performance.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/01/2022

Zero Day Threat Detection Using Metric Learning Autoencoders

The proliferation of zero-day threats (ZDTs) to companies' networks has ...
research
08/29/2022

Lateral Movement Detection Using User Behavioral Analysis

Lateral Movement refers to methods by which threat actors gain initial a...
research
12/08/2021

ESAFE: Enterprise Security and Forensics at Scale

Securing enterprise networks presents challenges in terms of both their ...
research
02/12/2018

RAPPER: Ransomware Prevention via Performance Counters

Ransomware can produce direct and controllable economic loss, which make...
research
04/16/2021

Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector

Email threat is a serious issue for enterprise security, which consists ...
research
10/05/2021

Dataset: Large-scale Urban IoT Activity Data for DDoS Attack Emulation

As IoT deployments grow in scale for applications such as smart cities, ...

Please sign up or login with your details

Forgot password? Click here to reset