Strategic Monitoring for Efficient Detection of Simultaneous APT Attacks with Limited Resources
نویسندگان
چکیده
Advanced Persistent Threats (APT) are a type of sophisticated multistage cyber attack, and the defense against APT is challenging. Existing studies apply signature-based or behavior-based methods to analyze monitoring data detect APT, but little research has been dedicated important problem addressing detection with limited resources. In order maintain primary functionality system, resources allocated for security purposes, example logging examining behavior usually constrained. Therefore, when facing multiple simultaneous powerful attacks like allocation becomes critical. The in this paper focuses on threat model where exist defender’s defender does not have sufficient check every running process. To capture footprint activities including benign activities, work leverages provenance graph which constructed based dependencies processes. Furthermore, strategy efficiently from incomplete information paths graph, by considering both “exploitation” effect “exploration” effect. contributions two-fold. First, it extends classic UCB algorithm domain multi-armed bandit solve problems, proposes use malevolence value path, generated novel LSTM neural network as exploitation term. Second, consideration innovative experimental results show that beneficial enforce satisfies same property term using proposed strategy, detected more than random greedy regarding time needed number attacks.
منابع مشابه
Multi-UAV Monitoring with Priorities and Limited Energy Resources
This paper introduces a monitoring problem with limited energy resources and soft constraints on priorities employing a fleet of unmanned aerial vehicles (UAVs). This monitoring problem is a generalization of application cases ranging from surveillance of open-air events to monitoring crime scenes or disaster sites. In order to compute solutions, we propose an insertion heuristic with a negotia...
متن کاملProject selection with limited resources in data envelopment analysis
In this paper allocating a fixed resource for producing finite projects in order to obtaining a desired level of efficiency will be discussed. Note that it is assumed that a vector of limited sources is at hand. This vector of resources can be contained human resource, budget, equipment, and facilities. In any firm there exist different suggestions from subunits for running...
متن کاملA Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources
Stealthy attacks are a major threat to cyber security. In practice, both attackers and defenders have resource constraints that could limit their capabilities. Hence, to develop robust defense strategies, a promising approach is to utilize game theory to understand the fundamental trade-offs involved. Previous works in this direction, however, mainly focus on the single-node case without consid...
متن کاملTiling with limited resources
In the framework of perfect loop nests with uniform dependences, tiling has been extensively studied as a source-to-source program transformation. Little work has been devoted to the mapping and scheduling of the tiles on to physical processors. We present several new results in the context of limited computational resources, and assuming communication-computation overlap. In particular, under ...
متن کاملEfficient Outcomes in Repeated Games with Limited Monitoring
The Folk Theorem for infinitely repeated games with imperfect public monitoring implies that for a general class of games, nearly efficient payoffs can be supported in perfect public equilibrium (PPE) provided the monitoring structure is sufficiently rich and players are arbitrarily patient. This paper shows that for stage games in which actions of players interfere strongly with each other, ex...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Computer Science and Applications
سال: 2023
ISSN: ['2158-107X', '2156-5570']
DOI: https://doi.org/10.14569/ijacsa.2023.0140303