ProvGRP: A Context-Aware Provenance Graph Reduction and Partition Approach for Facilitating Attack Investigation
-
Published:2023-12-25
Issue:1
Volume:13
Page:100
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Li Jiawei1ORCID, Zhang Ru1, Liu Jianyi1
Affiliation:
1. School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
Abstract
Attack investigation is a crucial technique in proactively defending against sophisticated attacks. Its purpose is to identify attack entry points and previously unknown attack traces through comprehensive analysis of audit data. However, a major challenge arises from the vast and redundant nature of audit logs, making attack investigation difficult and prohibitively expensive. To address this challenge, various technologies have been proposed to reduce audit data, facilitating efficient analysis. However, most of these techniques rely on defined templates without considering the rich context information of events. Moreover, these methods fail to remove false dependencies caused by the coarse-grained nature of logs. To address these limitations, this paper proposes a context-aware provenance graph reduction and partition approach for facilitating attack investigation named ProvGRP. Specifically, three features are proposed to determine whether system events are the same behavior from multiple dimensions. Based on the insight that information paths belonging to the same high-level behavior share similar information flow patterns, ProvGRP generates information paths containing context, and identifies and merges paths that share similar flow patterns. Experimental results show that ProvGRP can efficiently reduce provenance graphs with minimal loss of crucial information, thereby facilitating attack investigation in terms of runtime and results.
Funder
National Natural Science Foundation of China Fundamental Research Funds for the Central Universities
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference34 articles.
1. Alsaheel, A., Nan, Y., Ma, S., Yu, L., Walkup, G., Celik, Z.B., Zhang, X., and Xu, D. (2021, January 11–13). ATLAS: A Sequence-based Learning Approach for Attack Investigation. Proceedings of the 30th USENIX Security Symposium, Vancouver, BC, Canada. 2. Hassan, W.U., Noureddine, M.A., Datta, P., and Bates, A. (2020, January 23–26). OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis. Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, USA. 3. Gao, P., Xiao, X., Li, Z., Xu, F., Kulkarni, S.R., and Mittal, P. (2018, January 11–13). AIQL: Enabling Efficient Attack Investigation from System Monitoring Data. Proceedings of the 2018 USENIX Annual Technical Conference (USENIX ATC 18), Boston, MA, USA. 4. Milajerdi, S.M., Eshete, B., Gjomemo, R., and Venkatakrishnan, V.N. (2019, January 9–13). POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting. Proceedings of the ACM Conference on Computer and Communications Security, New York, NY, USA. 5. Kwon, Y., Wang, F., Wang, W., Lee, K.H., Lee, W.C., Ma, S., Zhang, X., Xu, D., Jha, S., and Ciocarlie, G. (2018, January 18–21). MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation. Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, USA.
|
|