Needle in a Haystack: Attack Detection from Large-Scale System Audit.

Han Yu,Aiping Li,Rong Jiang
DOI: https://doi.org/10.1109/icct46805.2019.8947201
2019-01-01
Abstract:In this paper, we present a system NeedleHunter to detect Advanced and Persistent Threats (APTs) and reconstruction of attack scenarios. Due to the information asymmetry between attackers and defenders, detecting APT attacks remains to be a challenge. Instead of targeting individual exploits, correlating the various stages of the attack is a substantially more feasible strategy. In our approach, we first construct a version-based provenance graph by analyzing system audit logs. Then, we use the rule-based technique to detection a particular stage of the attack, and connect these attacks to generate an attack path by leveraging the correlation between information flows. Also, we implement the compaction technique to compress the scale of the graph for scalable forensic analysis. An evaluation of our approach indicates that NeedleHunter can capture the key stages of APT campaigns with high precision and reconstruct the details of the attacks.
What problem does this paper attempt to address?