Uncovering Lateral Movement Using Authentication Logs

被引:21
作者
Bian, Haibo [1 ]
Bai, Tim [1 ]
Salahuddin, Mohammad A. [2 ]
Limam, Noura [3 ]
Daya, Abbas Abou [3 ]
Boutaba, Raouf [1 ]
机构
[1] Univ Waterloo, Dept Comp Sci, Waterloo, ON N2L 3G1, Canada
[2] Univ Waterloo, David R Cheriton Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
[3] Univ Waterloo, DC Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2021年 / 18卷 / 01期
基金
加拿大自然科学与工程研究理事会;
关键词
Feature extraction; Authentication; Training; Anomaly detection; Tagging; Protocols; Principal component analysis; Machine learning; advanced persistent threat; intrusion detection; adversarial learning;
D O I
10.1109/TNSM.2021.3054356
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network infiltrations due to advanced persistent threats (APTs) have significantly grown in recent years. Their primary objective is to gain unauthorized access to network assets, compromise system and data. APTs are stealthy and remain dormant for an extended period of time, which makes their detection challenging. In this article, we leverage machine learning (ML) to detect hosts in a network that are a target of an APT attack. We evaluate a number of ML classifiers to detect susceptible hosts in the Los Alamos National Lab dataset. We (i) scrutinize graph-based features extracted from host authentication logs, (ii) use feature engineering to reduce dimensionality, (iii) explore balancing the training dataset using over- and under-sampling techniques, (iv) evaluate numerous supervised ML techniques and their ensemble, (v) compare our classification model to the state-of-the-art approaches that leverage the same dataset, and show that our model outperforms them with respect to prediction performance and overhead, and (vi) perturb the attack patterns to study the influence of change in attack frequency and scale on classification performance, and propose a solution for such adversarial behavior.
引用
收藏
页码:1049 / 1063
页数:15
相关论文
共 42 条
[1]   BotChase: Graph-Based Bot Detection Using Machine Learning [J].
Abou Daya, Abbas ;
Salahuddin, Mohammad A. ;
Limam, Noura ;
Boutaba, Raouf .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (01) :15-29
[2]   DeepDGA: Adversarially-Tuned Domain Generation and Detection [J].
Anderson, Hyrum S. ;
Woodbridge, Jonathan ;
Filar, Bobby .
AISEC'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, 2016, :13-21
[3]  
[Anonymous], 2019, CRYPTO EXCHANGE DRAG
[4]  
[Anonymous], 2011, P 2011 INT C UNSUPER
[5]  
[Anonymous], 2010, P 9 PYTHON SCI C, DOI DOI 10.25080/MAJORA-92BF1922-00A
[6]  
[Anonymous], 2016, SOK SCI SECURITY PRI
[7]  
[Anonymous], 2018, P IEEE IFIP NETW OP
[8]  
[Anonymous], 2017, DET LAT MOV TRACK EV
[9]   Machine Learning for Cognitive Network Management [J].
Ayoubi, Sara ;
Limam, Noura ;
Salahuddin, Mohammad A. ;
Shahriar, Nashid ;
Boutaba, Raouf ;
Estrada-Solano, Felipe ;
Caicedo, Oscar M. .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (01) :158-165
[10]  
Bian H., 2019, AIAA Paper 2019-2685, P1, DOI [10.1109/ICEMS.2009.8921554, DOI 10.1109/ICEMS.2009.8921554, DOI 10.2514/6.2019-2685]