Provenance-based Intrusion Detection Systems: A Survey

被引:43
作者
Zipperle, Michael [1 ,2 ]
Gottwalt, Florian [1 ]
Chang, Elizabeth [3 ]
Dillon, Tharam [4 ]
机构
[1] Univ New South Wales, Northcott Dr, Canberra, ACT 2612, Australia
[2] Cyber Secur Cooperat Res Ctr, Canberra, ACT, Australia
[3] Griffith Univ, Parklands Dr, Gold Coast, Qld 4222, Australia
[4] La Trobe Univ, Plenty Rd,Kingsbury Dr, Melbourne, Vic 3086, Australia
关键词
Intrusion detection; data provenance; graph summarization; machine learning; benchmark dataset; survey;
D O I
10.1145/3539605
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traditional Intrusion Detection Systems (IDS) cannot cope with the increasing number and sophistication of cyberattacks such as Advanced Persistent Threats (APT). Due to their high false-positive rate and the required effort of security experts to validate them, incidents can remain undetected for up to several months. As a result, enterprises suffer from data loss and severe financial damage. Recent research explored data provenance for Host-based Intrusion Detection Systems (HIDS) as one promising data source to tackle this issue. Data provenance represents information flows between system entities as Direct Acyclic Graph (DAG). Provenance-based Intrusion Detection Systems (PIDS) utilize data provenance to enhance the detection performance of intrusions and reduce false-alarm rates compared to traditional IDS. This survey demonstrates the potential of PIDS by providing a detailed evaluation of recent research in the field, proposing a novel taxonomy for PIDS, discussing current issues, and potential future research directions. This survey aims to help and motivate researchers to get started in the field of PIDS by tackling issues of data collection, graph summarization, intrusion detection, and developing real-world benchmark datasets.
引用
收藏
页数:36
相关论文
共 114 条
  • [1] [Anonymous], 1989, ACM COMPUT SURV, V21, P593, DOI DOI 10.1145/76894.76897
  • [2] [Anonymous], 2020, BUSINESS INSIDER
  • [3] [Anonymous], 2009, USENIX ANN TECHN C
  • [4] [Anonymous], 2021, ITNEWS
  • [5] Axelsson S, 2000, INTRUSION DETECTION
  • [6] Ayoade G., 2020, IEEE CONF COMM NETW, P1, DOI DOI 10.1109/cns48642.2020.9162264
  • [7] Barre Mathieu, 2019, 11 INT WORKSHOP THEO
  • [8] Bates A, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P319
  • [9] Taming the Costs of Trustworthy Provenance through Policy Reduction
    Bates, Adam
    Tian, Dave
    Hernandez, Grant
    Moyer, Thomas
    Butler, Kevin R. B.
    Jaeger, Trent
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2017, 17 (04)
  • [10] A baseline for unsupervised advanced persistent threat detection in system-level provenance
    Berrada, Ghita
    Cheney, James
    Benabderrahmane, Sidahmed
    Maxwell, William
    Mookherjee, Himan
    Theriault, Alec
    Wright, Ryan
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 : 401 - 413