Affiliation:
1. School of Computer Science and Technology, Xidian University, Xi’an 710071, China
2. State Grid Jiangxi Electric Power Research Institute, Nanchang 330077, China
Abstract
Clandestine assailants infiltrate intelligent systems in smart cities and homes for different purposes. These attacks leave clues behind in multiple logs. Systems usually upload their local syslogs as encrypted files to the cloud for longterm storage and resource saving. Therefore, the identification of pre-attack steps through log investigation is crucial for proactive system protection. Current methodologies involve system diagnosis using logs, often relying on datasets for feature training. Furthermore, the prevalence of mass encrypted logs in the cloud introduces a new layer of complexity to this domain. To tackle these challenges, we introduce CrptAC, a system for Multiple Encrypted Log Correlated Analysis, aimed at reconstructing attack chains to prevent further attacks securely. CrptAC initiates by searching and downloading relevant log files from encrypted logs stored in an untrusted cloud environment. Utilizing the obtained logs, it addresses the challenge of discovering event relationships to establish the attack provenance. The system employs various logs to construct event sequences leading up to an attack. Subsequently, we utilize Weighted Graphs and the Longest Common Subsequences algorithm to identify regular steps preceding an attack without the need for third-party training datasets. This approach enables the proactive identification of pre-attack steps by analyzing related log sequences. We apply our methodology to predict attacks in cloud computing and router breach provenance environments. Finally, we validate the proposed method, demonstrating its effectiveness in constructing attack steps and conclusively identifying corresponding syslogs.
Funder
National Key Research and Development Program of China
National Natural Science Foundation of China under Grant
Reference42 articles.
1. Advancements in industrial cyber-physical systems: An overview and perspectives;Zhang;IEEE Trans. Ind. Inform.,2022
2. Blockchain based AI-enabled Industry 4.0 CPS Protection against Advanced Persistent Threat;Rahman;IEEE Internet Things J.,2022
3. CONAN: A Practical Real-time APT Detection System with High Accuracy and Efficiency;Xiong;IEEE Trans. Dependable Secur. Comput.,2020
4. Hassan, W.U., Bates, A., and Marino, D. (2020, January 18–21). Tactical Provenance Analysis for Endpoint Detection and Response Systems. Proceedings of the 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.
5. Secure Updatable Storage Access Control System for EHRs in the Cloud;Wang;IEEE Trans. Serv. Comput.,2022