Proceedings 2018 Network and Distributed System Security Symposium 2018
DOI: 10.14722/ndss.2018.23254
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Timely Causality Analysis for Enterprise Security

Abstract: Abstract-The increasingly sophisticated Advanced Persistent Threat (APT) attacks have become a serious challenge for enterprise IT security. Attack causality analysis, which tracks multi-hop causal relationships between files and processes to diagnose attack provenances and consequences, is the first step towards understanding APT attacks and taking appropriate responses. Since attack causality analysis is a time-critical mission, it is essential to design causality tracking systems that extract useful attack … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
133
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 137 publications
(133 citation statements)
references
References 17 publications
0
133
0
Order By: Relevance
“…Provenance graphs are increasingly popular for attack analysis [15], [40], [79], [102] and are attractive for APT detection. In particular, provenance graphs capture causality relationships between events.…”
Section: A Provenance Graphmentioning
confidence: 99%
“…Provenance graphs are increasingly popular for attack analysis [15], [40], [79], [102] and are attractive for APT detection. In particular, provenance graphs capture causality relationships between events.…”
Section: A Provenance Graphmentioning
confidence: 99%
“…Among these, BEEP [34], ProTracer [39], and MPI [38] use training and code instrumentation and annotations to divide process executions into smaller units, to address dependency explosion and provide better forensic analysis. PrioTracker [36] performs timely causality analysis by quantifying the notion of event rareness to prioritize the investigation of abnormal causal dependencies. In contrast, HOLMES uses system event traces to perform realtime detection, with integrated forensics capabilities in the detection framework, in the form of high-level attack steps, without requiring instrumentation.…”
Section: G Live Experimentsmentioning
confidence: 99%
“…• Application of human-defined knowledge [3,7,30,55,87] • Modeling trojan/ransomware behaviors [6,41,46,89] • Modeling botnet behaviors [5,28,37,62,97] • Modeling malicious download behaviors [36,45,46,84] • Modeling malicious browser extension behaviors [40] • Modeling malware behaviors [4,18,44,51,60,86] • Modeling malicious graph communities [39,70,91,97] • Modeling permitted behaviors [17,24,25,29,82,88] • Knowledge discovery on graphs [71,81,94] • Attack causality tracking and inference [42,47,54,85] • Anomaly detection [16,20,23,50,58,59,...…”
Section: Static Threat Model Approachesmentioning
confidence: 99%
“…Existing threat hunting practices fulfill this need with a mash-up solution -importing security and non-security data of all kinds into a SIEM [31,34] and employing SOC analysts for connecting the dots with the human languages/concepts as the universal interface. The procedure is aided by static threat model approaches for wellmodeled tasks, such as call chain traversal [9,54] or knowledge standardization for retrieval and sharing [35,52,68,83,95]. Performing threat hunting through graph computations establishes new programmability requirements beyond existing graph programming platforms [12,65] (discussed in Section 2).…”
Section: Dynamic Threat Model Approachesmentioning
confidence: 99%