2022
DOI: 10.1109/access.2022.3152574
|View full text |Cite
|
Sign up to set email alerts
|

Performance Evaluation of Open-Source Endpoint Detection and Response Combining Google Rapid Response and Osquery for Threat Detection

Abstract: Detecting the latest advanced persistent threats (APTs) using conventional information protection systems is a challenging task. Although various systems have been employed to detect such attacks, they are limited by their respective operating systems. Furthermore, they are developed as closed platforms and cannot be customized to meet user environments. To overcome these limitations, open-source endpoint detection and response (EDR) techniques are needed. In this study, we construct one that integrates openso… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…By applying security approaches and weakness filtering, the plant could distinguish and fix weaknesses quickly. This proactive methodology guaranteed the proceeded with activity of basic hardware and kept expected disturbances from cyberattacks [5]. 4.…”
Section: Case Studies and Use Casesmentioning
confidence: 99%
“…By applying security approaches and weakness filtering, the plant could distinguish and fix weaknesses quickly. This proactive methodology guaranteed the proceeded with activity of basic hardware and kept expected disturbances from cyberattacks [5]. 4.…”
Section: Case Studies and Use Casesmentioning
confidence: 99%
“…The real-world environment is not considered. Park et al [18] An open-source EDR system combining GRR and osquery is evaluated for threat detection, and incident detection experiments are conducted.…”
Section: Related Workmentioning
confidence: 99%
“…Park et al [18] integrated open-source security frameworks combining GRR and osquery to expand detection coverage. The APT coverage for the proposed EDR system was analyzed using MITRE's adversarial tactics, techniques, and common knowledge model.…”
Section: Detection Of Cyberattacks By Using Threat Detectorsmentioning
confidence: 99%
“…Attack detection and coverage analysis were feasible during all APT attack stages. [137] Semi-supervised Learning and Complex Networks Characteristics Identifies a susceptible host from a network of hosts suspected of participating in APT activities. [138] Clustering Algorithms Uses suitable clustering approaches such as APRIORI, K-means, and Hunt's algorithm to identify sophisticated APTs.…”
Section: Pc Graph2vec Algorithm and Deep Learningmentioning
confidence: 99%
“…A revolutionary framework for state-based detection was introduced, through which each process and file is represented as a well-designed data structure for real-time, long-term detection. For the first time, a study of open-source EDR enabled attack detection and coverage analysis for all APT attack phases, as defined by MITRE ATT&CK [137].…”
Section: Mitre Frameworkmentioning
confidence: 99%