Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments

Xiangmin Shen,Zhenyuan Li,Graham Burleigh,Lingzhi Wang,Yan Chen
2024-04-23
Abstract:Endpoint detection and response (EDR) systems have emerged as a critical component of enterprise security solutions, effectively combating endpoint threats like APT attacks with extended lifecycles. In light of the growing significance of endpoint detection and response (EDR) systems, many cybersecurity providers have developed their own proprietary EDR solutions. It's crucial for users to assess the capabilities of these detection engines to make informed decisions about which products to choose. This is especially urgent given the market's size, which is expected to reach around 3.7 billion dollars by 2023 and is still expanding. MITRE is a leading organization in cyber threat analysis. In 2018, MITRE started to conduct annual APT emulations that cover major EDR vendors worldwide. Indicators include telemetry, detection and blocking capability, etc. Nevertheless, the evaluation results published by MITRE don't contain any further interpretations or suggestions.
Cryptography and Security
What problem does this paper attempt to address?
This paper attempts to solve the following problems: 1. **Lack of overall attack graph analysis of EDR systems**: The existing MITRE ATT&CK evaluations mainly focus on single - step detection results, ignoring that complex APT attacks usually involve multiple steps. In order to comprehensively evaluate the performance of EDR systems, overall attack graph analysis is required to examine whether these systems can effectively reconstruct the complete attack chain and provide satisfactory detection and response services. 2. **Lack of in - depth interpretation of evaluation results**: Although the evaluation results released by MITRE provide detailed data, they lack in - depth explanations and suggestions for these data. This makes it difficult for users to directly obtain valuable insights from the results, which may lead to misunderstandings or biases regarding the performance of EDR products. Therefore, it is necessary to comprehensively and objectively interpret the evaluation results to help users better understand the advantages and disadvantages of different EDR products. 3. **Consistency issues in the evaluation framework**: MITRE's evaluation methods and terms change every year, making it difficult to directly compare the evaluation results of different years. To solve this problem, a compatible interpretation framework needs to be established to extract the common points in the evaluations of each year, so as to more accurately compare the evaluation results of different years. ### Specific solutions To solve the above problems, the author proposes the following methods: - **Whole - graph Analysis**: By constructing causal relationship attack graphs, study the association and reconstruction capabilities of EDR systems at the attack - chain level. Specifically, it includes: - **Connectivity Analysis**: Check whether the EDR system can detect all key steps and correctly associate these steps. - **Effectiveness Analysis**: Evaluate the response capabilities of the EDR system in the attack chain and determine whether it detects and blocks threats at the appropriate time points. - **Overall Trend Analysis**: Analyze the detection performance of EDR systems year by year from multiple perspectives (such as detection coverage, detection confidence, detection quality, data sources, and compatibility), providing insights into the advantages and disadvantages of intrusion detection systems. Through these methods, the author aims to fill the gaps in existing evaluations, provide more comprehensive and in - depth understanding, and help researchers, practitioners, and manufacturers better select and improve EDR products.