Discovering Correlations: A Formal Definition of Causal Dependency Among Heterogeneous Events

被引:5
作者
Xosanavongsa, Charles [1 ]
Totel, Eric [2 ]
Bettan, Olivier [3 ]
机构
[1] Univ Rennes, INRIA, Cent Supelec, CNRS,IRISA,Thales Six GTS France, Rennes, France
[2] Univ Rennes, INRIA, Cent Supelec, CNRS,IRISA, Rennes, France
[3] Thales Six GTS France, Rennes, France
来源
2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P) | 2019年
关键词
alert and event correlation; multi-step attack discovery; formal model; causal dependencies; distributed systems; forensic;
D O I
10.1109/EuroSP.2019.00033
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to supervise the security of a large infrastructure, the administrator deploys multiple sensors and intrusion detection systems on several critical places in the system. It is easier to explain and detect attacks if more events are logged. Starting from a suspicious event (appearing as a log entry), the administrator can start his investigation by manually building the set of previous events that are linked to this event of interest. Accordingly, the administrator attempts to identify links among the logged events in order to retrieve those that correspond to the traces of the attacker's actions in the supervised system; previous work is aimed at building these connections. In practice, however, this type of link is not trivial to define and discover. Hence, there is a real necessity to describe and define formally the semantics of these links in literature. In this paper, a clear definition of this relationship, called contextual event causal dependency, is introduced and proposed. The work presented in this paper aims at defining a formal model that would ideally unify previous work on causal dependencies among heterogeneous events. We define a relationship among events that enables the discovery of all events, which can be considered as the cause (in the past) or the effect (in the future) of an event of interest(e.g., an indicator of compromise, produced by an attacker action). This model is gradually introduced and defined by merging two previously defined causality models from the distributed system and operating system research areas (i.e., Lamport's and d'Ausbourg's). Our model takes into consideration heterogeneous events that emanate from different abstraction layers (e.g., network, system, and application) with the main objective of formally defining a causal relationship among logged events. Thereafter, we show how existing implementations separately allow the computation of parts of the model. Finally, we describe the implementation and assessment of the model according to real attacks on distributed environments and its accuracy to extract all causally linked events related to a given attack event trace.
引用
收藏
页码:340 / 355
页数:16
相关论文
共 41 条
[1]  
[Anonymous], 2018, NDSS 18
[2]  
[Anonymous], 2009, P USENIX ANN TECHN C
[3]  
Bates A. M., 2015, P USENIX SEC S
[4]  
Beschastnikh I., 2012, ACM SIGOPS OPERATING, V45
[5]  
Chow Jim, 2008, P USENIX ANN TECHN C
[6]  
Cuppens F., 2000, P INT WORKSH REC ADV
[7]  
dAusbourg B., 1994, P EUR S RES COMP SEC
[8]  
Devecsery D., 2014, P USENIX S OP SYST D, V14
[9]  
Eckmann S. T., 2002, J COMPUTER SECURITY, V10
[10]  
European Commission, 2010, STAND LOGG MON