Detecting APT attacks against Active Directory using Machine Leaning

被引:0
作者
Matsuda, Wataru [1 ]
Fujimoto, Mariko [1 ]
Mitsunaga, Takuho [1 ]
机构
[1] Univ Tokyo, Tokyo, Japan
来源
2018 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS 2018) | 2018年
关键词
machine learning; outlier detection; unsupervised learning; Active Directory; Event log; APT; Golden Ticket;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Advanced Persistent Threat (APT) attacks, attackers who can intrude into an organization network tend to stay inside the network or repeat intrusion multiple times until they are able to accomplish their goals. When Active Directory(AD), a centralization management system for Windows computers, is in place, attackers try to disguise themselves as users of legitimate Domain Administrator accounts, which is the highest privileged account of the AD environment. Activities on the Windows system are recorded in the built-in Windows activity logging system called the Event logs and is commonly used for investigation of attacks. However, if attackers leverage legitimate accounts or built-in Windows tools in order to avoid detection, it is quite difficult to detect attacks from Event logs since attackers' activities are recorded as activities of legitimate administrator accounts. Although there are various antivirus software, detecting such a sophisticated attack is often very difficult. In this research, we focus on processing attack activity data recorded in the Event logs, and propose a new method based on outlier detection and machine learning for detecting attacks that utilize legitimate accounts. We achieved a high precision rate even if legitimate Domain Administrator accounts are leveraged in attacks.
引用
收藏
页码:60 / 65
页数:6
相关论文
共 10 条
[1]  
Abe Shingo, DETECTING LATERAL MO
[2]  
CERT-EU, PROT KERB GOLD TICK
[3]  
Goldstein Markus, ENHANCING SECURITY E
[4]  
Hsieh Chih-Hung, AD2 ANOMALY DETECTIO
[5]  
JPCERT Coordination Center, DET LAT MOV TRACK EV
[6]  
JPCERT Coordination Center, WIND COMM AB ATT
[7]  
Microsoft, VULN KERB COULD ALL
[8]  
Plotnik Idan, SYSTEM METHOD PROCES
[9]  
Schwartz Darren B, SYSTEMS METHODS DETE
[10]  
Splunk Inc, FIND ADV A ACKS MALW