Multi-Step Attack Pattern Detection on Normalized Event Logs

被引:13
作者
Jaeger, David [1 ]
Ussath, Martin [1 ]
Cheng, Feng [1 ]
Meinel, Christoph [1 ]
机构
[1] Hasso Plattner Inst, Potsdam, Germany
来源
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud) | 2015年
关键词
pattern detection; attack signature; multi-step attack; event logs; normalization; threat intelligence; MODEL;
D O I
10.1109/CSCloud.2015.26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Looking at recent cyber-attacks in the news, a growing complexity and sophistication of attack techniques can be observed. Many of these attacks are performed in multiple steps to reach the core of the targeted network. Existing signature detection solutions are focused on the detection of a single step of an attack, but they do not see the big picture. Furthermore, current signature languages cannot integrate valuable external threat intelligence, which would simplify the creation of complex signatures and enables the detection of malicious activities seen by other targets. We extend an existing multi-step signature language to support attack detection on normalized log events, which were collected from various applications and devices. Additionally, the extended language supports the integration of external threat intelligence and allows us to reference current threat indicators. With this approach, we can create generic signatures that stay up-to-date. Using our language, we could detect various login brute-force attempts on multiple applications with only one generic signature.
引用
收藏
页码:390 / 398
页数:9
相关论文
共 16 条
  • [1] Alvarez V., 2015, Yara documentation
  • [2] Amann B., 2012, RES ATTACKS INTRUSIO, V7462, P314
  • [3] [Anonymous], INTRUSION DETECTION
  • [4] Azodi A., 2013, P 11 IEEE INT C DEP
  • [5] Azodi A., 2013, P 1 INT C ADV CLOUD
  • [6] Leveraging CybOX™ to standardize representation and exchange of digital forensic information
    Casey, Eoghan
    Back, Greg
    Barnum, Sean
    [J]. DIGITAL INVESTIGATION, 2015, 12 : S102 - S110
  • [7] Cuppens F, 2000, LECT NOTES COMPUT SC, V1907, P197
  • [8] Ernst & Young, 2014, TECH REP
  • [9] Jaeger D., 2015, P 9 INT C INF SEC TH, V9311, P238
  • [10] Krebs B., 2013, Sources: Target investigating data breach