Affiliation:
1. School of Cyber Science and Engineering, Sichuan University, Chengdu 610065, China
Abstract
With the wide use of Cyber-Physical Systems (CPS) in many applications, targets of advanced persistent threats (APTs) have been extended to the IoT and industrial control systems. Provenance graph analysis based on system audit logs has become a promising way for APT detection and investigation. However, we cannot afford to ignore that existing provenance-based APT detection systems lack the process–context information at system runtime, which seriously limits detection performance. In this paper, we proposed ConGraph, an approach for detecting APT attacks using provenance graphs combined with process context; we presented a module for collecting process context to detect APT attacks. This module collects file access behavior, network access behavior, and interactive relationship features of processes to enrich semantic information of the provenance graph. It was the first time that the provenance graph was combined with multiple process–context information to improve the detection performance of APT attacks. ConGraph extracts process activity features from the provenance graphs and submits the features to a CNN-BiLSTM model to detect underlying APT activities. Compared to some state-of-the-art models, our model raised the average precision rate, recall rate, and F-1 score by 13.12%, 25.61%, and 24.28%, respectively.
Funder
National Key Research and Development Program of China
National Natural Science Foundation of China
Reference38 articles.
1. Intrusion detection in cyber-physical systems: Techniques and challenges;Han;IEEE Syst. J.,2014
2. Stuxnet: Dissecting a cyberwarfare weapon;Langner;IEEE Secur. Priv.,2011
3. APT attacks on industrial control systems: A tale of three incidents;Kumar;Int. J. Crit. Infrastruct. Prot.,2022
4. Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J.A., Invernizzi, L., and Kallitsis, M. (2017, January 16–18). Understanding the mirai botnet. Proceedings of the 26th USENIX Security Symposium (USENIX Security 17), Vancouver, BC, Canada.
5. Sicato, J.C.S., Sharma, P.K., Loia, V., and Park, J.H. (2019). VPNFilter malware analysis on cyber threat in smart home network. Appl. Sci., 9.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献