Alert-driven Attack Graph Generation using S-PDFA
نویسندگان
چکیده
Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific to a network under observation. Such CTI currently requires extensive expert input for obtaining, assessing, and correlating system vulnerabilities graphical representation, often referred as an attack graph (AG). Instead of deriving AGs based on vulnerabilities, this work advocates the direct use intrusion alerts. We propose SAGE, explainable sequence learning pipeline automatically constructs from alerts without priori knowledge. SAGE exploits temporal probabilistic dependence between in suffix-based deterministic finite automaton (S-PDFA)-a model brings infrequent severe spotlight summarizes paths leading them. Attack graphs extracted per-victim, per-objective basis. is thoroughly evaluated three open-source alert datasets collected through security testing competitions order analyze distributed multi-stage attacks. compresses over 330k 93 show how attacks transpired. The succinct, interpretable, provide directly relevant strategic differences fingerprintable paths. They even attackers tend follow shorter after they have discovered longer one 84.5% cases.
منابع مشابه
A New Alert Correlation Algorithm Based on Attack Graph
Intrusion Detection Systems (IDS) are widely deployed in computer networks. As modern attacks are getting more sophisticated and the number of sensors and network nodes grows, the problem of false positives and alert analysis becomes more difficult to solve. Alert correlation was proposed to analyze alerts and to decrease false positives. Knowledge about the target system or environment is usua...
متن کاملIntrusion alert prioritisation and attack detection using post-correlation analysis
Event Correlation used to be a widely used technique for interpreting alert logs and discovering network attacks. However, due to the scale and complexity of today’s networks and attacks, alert logs produced by these modern networks are much larger in volume and difficult to analyse. In this research we show that adding post-correlation methods can be used alongside correlation to significantly...
متن کاملAttack Graphs for Sensor Placement, Alert Prioritization, and Attack Response
We describe the optimal placement of intrusion detection system (IDS) sensors and prioritization of IDS alarms, using attack graph analysis. Our attack graphs predict the various possible ways of penetrating a network to reach critical assets. In particular, automated analysis of network configuration and attacker exploits provides an attack graph showing all possible paths to critical assets. ...
متن کاملAttack Graph Generation with Implementation in Network Security
As an important method to analyze the security states of computer network, the generation of network attack graph is a hot topic in this domain. After analyzing network vulnerabilities, linking relation between devices and the characteristic of attack, the model of network security states is built, and the generating algorithm of attack graph is implemented. The experiment validates the prototy...
متن کاملAn Atomic-Domains-Based Approach for Attack Graph Generation
Attack graph is an integral part of modeling the overview of network security. System administrators use attack graphs to determine how vulnerable their systems are and to determine what security measures to deploy to defend their systems. Previous methods on AGG(attack graphs generation) are aiming at the whole network, which makes the process of AGG complex and non-scalable. In this paper, we...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2021
ISSN: ['1941-0018', '1545-5971', '2160-9209']
DOI: https://doi.org/10.1109/tdsc.2021.3117348