APM: An Attack Path-based Method for APT Attack Detection on Few-Shot Learning

被引:0
作者
Li, Jiacheng [1 ]
Li, Tong [1 ]
Zhang, Runzi [2 ]
Wu, Di [1 ]
Yue, Hao [1 ]
Yang, Zhen [1 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing, Peoples R China
[2] NSFOCUS Technol Grp Co Ltd, Beijing, Peoples R China
来源
2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023 | 2024年
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
attack detection; attack path; provenance graph; few-shot learning;
D O I
10.1109/TrustCom60117.2023.00025
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Advanced persistent threat (APT) attack leverages various intelligence-gathering techniques to obtain sensitive and critical information, imposing increasing threats to modern software enterprises. However, due to the persistent presence of APT attacks, it is difficult to effectively analyze a large amount of audit data for detecting such attacks, especially for small and medium-sized enterprises (SMEs). This limitation hinders security operation centers (SOC) from promptly handling APT attacks. In this paper, we propose an attack path-based method (APM) for APT attack detection on few-shot learning. Specifically, APM first identifies candidate malicious entities from the provenance graph, contributing to the completion of the missing attack paths. Secondly, we propose a systematic method to exploit potential attack behaviors in the attack path based on the identified candidate malicious entities. We evaluate APM through five APT attacks in realistic environments. Compared to existing baselines, the precision, recall, and F1-score of APM for attack detection increased by 0.28%, 1.64%, and 1.13%, respectively. The results show that our proposal can outperform baseline approaches and effectively detect APT attacks based on few-shot learning.
引用
收藏
页码:10 / 19
页数:10
相关论文
共 36 条
  • [1] Alsaheel A, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P3005
  • [2] Bates A, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P319
  • [3] Staudemeyer RC, 2019, Arxiv, DOI arXiv:1909.09586
  • [4] Ding HL, 2023, PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, P3277
  • [5] F. T. Intelligence, Second adobe flash zero-day cve-2015-5122 from hackingteam exploited in strategic web compromise targeting japanese victims
  • [6] Graph embedding techniques, applications, and performance: A survey
    Goyal, Palash
    Ferrara, Emilio
    [J]. KNOWLEDGE-BASED SYSTEMS, 2018, 151 : 78 - 94
  • [7] Han X., 2018, 10 USENIX WORKSHOP T
  • [8] Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics
    Hossain, Md Nahid
    Sheikhi, Sanaz
    Sekar, R.
    [J]. 2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 1139 - 1155
  • [9] Hossain MN, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1723
  • [10] Hossain MN, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P487