Hercule: Attack story reconstruction via community discovery on correlated log graph

K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang… - Proceedings of the …, 2016 - dl.acm.org
Proceedings of the 32Nd Annual Conference on Computer Security Applications, 2016dl.acm.org
Advanced cyber attacks consist of multiple stages aimed at being stealthy and elusive. Such
attack patterns leave their footprints spatio-temporally dispersed across many different logs
in victim machines. However, existing log-mining intrusion analysis systems typically target
only a single type of log to discover evidence of an attack and therefore fail to exploit
fundamental inter-log connections. The output of such single-log analysis can hardly reveal
the complete attack story for complex, multi-stage attacks. Additionally, some existing …
Advanced cyber attacks consist of multiple stages aimed at being stealthy and elusive. Such attack patterns leave their footprints spatio-temporally dispersed across many different logs in victim machines. However, existing log-mining intrusion analysis systems typically target only a single type of log to discover evidence of an attack and therefore fail to exploit fundamental inter-log connections. The output of such single-log analysis can hardly reveal the complete attack story for complex, multi-stage attacks. Additionally, some existing approaches require heavyweight system instrumentation, which makes them impractical to deploy in real production environments. To address these problems, we present HERCULE, an automated multi-stage log-based intrusion analysis system. Inspired by graph analytics research in social network analysis, we model multi-stage intrusion analysis as a community discovery problem. HERCULE builds multi-dimensional weighted graphs by correlating log entries across multiple lightweight logs that are readily available on commodity systems. From these, HERCULE discovers any "attack communities" embedded within the graphs. Our evaluation with 15 well known APT attack families demonstrates that HERCULE can reconstruct attack behaviors from a spectrum of cyber attacks that involve multiple stages with high accuracy and low false positive rates.
ACM Digital Library
以上显示的是最相近的搜索结果。 查看全部搜索结果