Detection and Threat Prioritization of Pivoting Attacks in Large Networks

被引:15
作者
Apruzzese, Giovanni [1 ]
Pierazzi, Fabio [1 ]
Colajanni, Michele [1 ]
Marchetti, Mirco [1 ]
机构
[1] Univ Modena & Reggio Emilia, Dept Engn Enzo Ferrari, I-41121 Modena, Italy
关键词
Protocols; Detection algorithms; Security; Proposals; Organizations; Algorithm design and analysis; Malware; Pivoting; graph; island-hopping; lateral movement; WORM DETECTION;
D O I
10.1109/TETC.2017.2764885
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several advanced cyber attacks adopt the technique of "pivoting" through which attackers create a command propagation tunnel through two or more hosts in order to reach their final target. Identifying such malicious activities is one of the most tough research problems because of several challenges: command propagation is a rare event that cannot be detected through signatures, the huge amount of internal communications facilitates attackers evasion, timely pivoting discovery is computationally demanding. This paper describes the first pivoting detection algorithm that is based on network flows analyses, does not rely on any a-priori assumption on protocols and hosts, and leverages an original problem formalization in terms of temporal graph analytics. We also introduce a prioritization algorithm that ranks the detected paths on the basis of a threat score thus letting security analysts investigate just the most suspicious pivoting tunnels. Feasibility and effectiveness of our proposal are assessed through a broad set of experiments that demonstrate its higher accuracy and performance against related algorithms.
引用
收藏
页码:404 / 415
页数:12
相关论文
共 34 条
  • [31] A comprehensive approach to intrusion detection alert correlation
    Valeur, F
    Vigna, G
    Kruegel, C
    Kemmerer, RA
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (03) : 146 - 169
  • [32] Path Problems in Temporal Graphs
    Wu, Huanhuan
    Cheng, James
    Huang, Silu
    Ke, Yiping
    Lu, Yi
    Xu, Yanyan
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2014, 7 (09): : 721 - 732
  • [33] A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities
    Wu, Jun
    Ota, Kaoru
    Dong, Mianxiong
    Li, Chunxiao
    [J]. IEEE ACCESS, 2016, 4 : 416 - 424
  • [34] A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
    Zargar, Saman Taghavi
    Joshi, James
    Tipper, David
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (04): : 2046 - 2069