Proceedings 2018 Network and Distributed System Security Symposium 2018
DOI: 10.14722/ndss.2018.23306
|View full text |Cite
|
Sign up to set email alerts
|

MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation

Abstract: In this paper, we develop a model based causality inference technique for audit logging that does not require any application instrumentation or kernel modification. It leverages a recent dynamic analysis, dual execution (LDX), that can infer precise causality between system calls but unfortunately requires doubling the resource consumption such as CPU time and memory consumption. For each application, we use LDX to acquire precise causal models for a set of primitive operations. Each model is a sequence of sy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
62
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 91 publications
(62 citation statements)
references
References 27 publications
0
62
0
Order By: Relevance
“…Prior solutions to the dependency explosion problem [46], [51], [50], [44] propose to partition the execution of a long running process into autonomous "units" in order to provide more precise causal dependency between input and output events. However, these systems require end-user involvement and system changes through source code instrumentation, training runs of application with typical workloads, and modifying the kernel.…”
Section: B Existing Tools Limitationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Prior solutions to the dependency explosion problem [46], [51], [50], [44] propose to partition the execution of a long running process into autonomous "units" in order to provide more precise causal dependency between input and output events. However, these systems require end-user involvement and system changes through source code instrumentation, training runs of application with typical workloads, and modifying the kernel.…”
Section: B Existing Tools Limitationsmentioning
confidence: 99%
“…As mentioned previously, existing execution partitioning techniques [46], [51], [50], [44] for precise dependencies are not feasible in an enterprise. In the case of true alerts, NODOZE solves this problem by leveraging the observation that the attack's dependencies will be readily apparent because the true path will have much higher anomaly score.…”
Section: Nodoze Overview and Approachmentioning
confidence: 99%
“…Winnower [55] provides a storage efficient provenance auditing framework for large clusters. MCI [68] proposes a reliable and efficient approach to restore fine-grained information flow among system events using dual execution (LDX). While these techniques address different problems, we believe that they can be integrated into PROVDETECTOR to improve its accuracy.…”
Section: Provenance-based Solutionsmentioning
confidence: 99%
“…• Application of human-defined knowledge [3,7,30,55,87] • Modeling trojan/ransomware behaviors [6,41,46,89] • Modeling botnet behaviors [5,28,37,62,97] • Modeling malicious download behaviors [36,45,46,84] • Modeling malicious browser extension behaviors [40] • Modeling malware behaviors [4,18,44,51,60,86] • Modeling malicious graph communities [39,70,91,97] • Modeling permitted behaviors [17,24,25,29,82,88] • Knowledge discovery on graphs [71,81,94] • Attack causality tracking and inference [42,47,54,85] • Anomaly detection [16,20,23,50,58,59,...…”
Section: Static Threat Model Approachesmentioning
confidence: 99%